Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/libksba@1.3.3-1?distro=trixie
Typedeb
Namespacedebian
Namelibksba
Version1.3.3-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.3.4-3
Latest_non_vulnerable_version1.6.8-2
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-2k1z-c7zj-8kc7
vulnerability_id VCID-2k1z-c7zj-8kc7
summary libksba: denial of service due to stack overflow in src/ber-decoder.c (push_decoder_state, pop_decoder_state)
references
0
reference_url http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git%3Ba=commit%3Bh=07116a314f4dcd4d96990bbd74db95a03a9f650a
reference_id
reference_type
scores
url http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git%3Ba=commit%3Bh=07116a314f4dcd4d96990bbd74db95a03a9f650a
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4353.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4353.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4353
reference_id
reference_type
scores
0
value 0.01078
scoring_system epss
scoring_elements 0.7785
published_at 2026-04-21T12:55:00Z
1
value 0.01078
scoring_system epss
scoring_elements 0.77857
published_at 2026-04-16T12:55:00Z
2
value 0.01078
scoring_system epss
scoring_elements 0.77856
published_at 2026-04-18T12:55:00Z
3
value 0.01078
scoring_system epss
scoring_elements 0.77763
published_at 2026-04-01T12:55:00Z
4
value 0.01078
scoring_system epss
scoring_elements 0.77769
published_at 2026-04-02T12:55:00Z
5
value 0.01078
scoring_system epss
scoring_elements 0.77796
published_at 2026-04-04T12:55:00Z
6
value 0.01078
scoring_system epss
scoring_elements 0.77779
published_at 2026-04-07T12:55:00Z
7
value 0.01078
scoring_system epss
scoring_elements 0.77807
published_at 2026-04-08T12:55:00Z
8
value 0.01078
scoring_system epss
scoring_elements 0.77812
published_at 2026-04-09T12:55:00Z
9
value 0.01078
scoring_system epss
scoring_elements 0.77838
published_at 2026-04-11T12:55:00Z
10
value 0.01078
scoring_system epss
scoring_elements 0.77822
published_at 2026-04-12T12:55:00Z
11
value 0.01078
scoring_system epss
scoring_elements 0.77821
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4353
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4353
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://security.gentoo.org/glsa/201604-04
reference_id
reference_type
scores
url https://security.gentoo.org/glsa/201604-04
6
reference_url http://www.openwall.com/lists/oss-security/2016/04/29/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/04/29/5
7
reference_url http://www.openwall.com/lists/oss-security/2016/04/29/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/04/29/8
8
reference_url http://www.ubuntu.com/usn/USN-2982-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2982-1
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1211261
reference_id 1211261
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1211261
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-4353
reference_id CVE-2016-4353
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-4353
14
reference_url https://usn.ubuntu.com/2982-1/
reference_id USN-2982-1
reference_type
scores
url https://usn.ubuntu.com/2982-1/
fixed_packages
0
url pkg:deb/debian/libksba@1.3.3-1?distro=trixie
purl pkg:deb/debian/libksba@1.3.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.3.3-1%3Fdistro=trixie
1
url pkg:deb/debian/libksba@1.5.0-3%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/libksba@1.5.0-3%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.5.0-3%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/libksba@1.6.3-2?distro=trixie
purl pkg:deb/debian/libksba@1.6.3-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.6.3-2%3Fdistro=trixie
3
url pkg:deb/debian/libksba@1.6.7-2?distro=trixie
purl pkg:deb/debian/libksba@1.6.7-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.6.7-2%3Fdistro=trixie
4
url pkg:deb/debian/libksba@1.6.8-2?distro=trixie
purl pkg:deb/debian/libksba@1.6.8-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.6.8-2%3Fdistro=trixie
aliases CVE-2016-4353
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2k1z-c7zj-8kc7
1
url VCID-7p37-h69u-kkam
vulnerability_id VCID-7p37-h69u-kkam
summary libksba: encoding of invalid utf-8 strings in DN decoder src/dn.c (append_quoted, append_atv)
references
0
reference_url http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git%3Ba=commit%3Bh=243d12fdec66a4360fbb3e307a046b39b5b4ffc3
reference_id
reference_type
scores
url http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git%3Ba=commit%3Bh=243d12fdec66a4360fbb3e307a046b39b5b4ffc3
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4356.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4356.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4356
reference_id
reference_type
scores
0
value 0.00956
scoring_system epss
scoring_elements 0.7646
published_at 2026-04-21T12:55:00Z
1
value 0.00956
scoring_system epss
scoring_elements 0.76471
published_at 2026-04-16T12:55:00Z
2
value 0.00956
scoring_system epss
scoring_elements 0.76475
published_at 2026-04-18T12:55:00Z
3
value 0.00956
scoring_system epss
scoring_elements 0.7637
published_at 2026-04-01T12:55:00Z
4
value 0.00956
scoring_system epss
scoring_elements 0.76373
published_at 2026-04-02T12:55:00Z
5
value 0.00956
scoring_system epss
scoring_elements 0.76403
published_at 2026-04-04T12:55:00Z
6
value 0.00956
scoring_system epss
scoring_elements 0.76385
published_at 2026-04-07T12:55:00Z
7
value 0.00956
scoring_system epss
scoring_elements 0.76418
published_at 2026-04-08T12:55:00Z
8
value 0.00956
scoring_system epss
scoring_elements 0.76432
published_at 2026-04-09T12:55:00Z
9
value 0.00956
scoring_system epss
scoring_elements 0.76457
published_at 2026-04-11T12:55:00Z
10
value 0.00956
scoring_system epss
scoring_elements 0.76435
published_at 2026-04-12T12:55:00Z
11
value 0.00956
scoring_system epss
scoring_elements 0.76429
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4356
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4356
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://security.gentoo.org/glsa/201604-04
reference_id
reference_type
scores
url https://security.gentoo.org/glsa/201604-04
6
reference_url http://www.openwall.com/lists/oss-security/2016/04/29/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/04/29/5
7
reference_url http://www.openwall.com/lists/oss-security/2016/04/29/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/04/29/8
8
reference_url http://www.openwall.com/lists/oss-security/2016/05/10/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/05/10/3
9
reference_url http://www.ubuntu.com/usn/USN-2982-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2982-1
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1211259
reference_id 1211259
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1211259
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-4356
reference_id CVE-2016-4356
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-4356
15
reference_url https://usn.ubuntu.com/2982-1/
reference_id USN-2982-1
reference_type
scores
url https://usn.ubuntu.com/2982-1/
fixed_packages
0
url pkg:deb/debian/libksba@1.3.3-1?distro=trixie
purl pkg:deb/debian/libksba@1.3.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.3.3-1%3Fdistro=trixie
1
url pkg:deb/debian/libksba@1.5.0-3%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/libksba@1.5.0-3%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.5.0-3%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/libksba@1.6.3-2?distro=trixie
purl pkg:deb/debian/libksba@1.6.3-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.6.3-2%3Fdistro=trixie
3
url pkg:deb/debian/libksba@1.6.7-2?distro=trixie
purl pkg:deb/debian/libksba@1.6.7-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.6.7-2%3Fdistro=trixie
4
url pkg:deb/debian/libksba@1.6.8-2?distro=trixie
purl pkg:deb/debian/libksba@1.6.8-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.6.8-2%3Fdistro=trixie
aliases CVE-2016-4356
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7p37-h69u-kkam
2
url VCID-hj28-x236-9ufu
vulnerability_id VCID-hj28-x236-9ufu
summary libksba: integer overflow in the BER decoder src/ber-decoder.c (ber_decoder_s)
references
0
reference_url http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git%3Ba=commit%3Bh=aea7b6032865740478ca4b706850a5217f1c3887
reference_id
reference_type
scores
url http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git%3Ba=commit%3Bh=aea7b6032865740478ca4b706850a5217f1c3887
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4354.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4354.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4354
reference_id
reference_type
scores
0
value 0.01072
scoring_system epss
scoring_elements 0.77776
published_at 2026-04-21T12:55:00Z
1
value 0.01072
scoring_system epss
scoring_elements 0.77784
published_at 2026-04-16T12:55:00Z
2
value 0.01072
scoring_system epss
scoring_elements 0.77782
published_at 2026-04-18T12:55:00Z
3
value 0.01072
scoring_system epss
scoring_elements 0.77687
published_at 2026-04-01T12:55:00Z
4
value 0.01072
scoring_system epss
scoring_elements 0.77694
published_at 2026-04-02T12:55:00Z
5
value 0.01072
scoring_system epss
scoring_elements 0.77722
published_at 2026-04-04T12:55:00Z
6
value 0.01072
scoring_system epss
scoring_elements 0.77705
published_at 2026-04-07T12:55:00Z
7
value 0.01072
scoring_system epss
scoring_elements 0.77733
published_at 2026-04-08T12:55:00Z
8
value 0.01072
scoring_system epss
scoring_elements 0.77738
published_at 2026-04-09T12:55:00Z
9
value 0.01072
scoring_system epss
scoring_elements 0.77764
published_at 2026-04-11T12:55:00Z
10
value 0.01072
scoring_system epss
scoring_elements 0.77748
published_at 2026-04-12T12:55:00Z
11
value 0.01072
scoring_system epss
scoring_elements 0.77747
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4354
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4354
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4354
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://security.gentoo.org/glsa/201604-04
reference_id
reference_type
scores
url https://security.gentoo.org/glsa/201604-04
6
reference_url http://www.openwall.com/lists/oss-security/2016/04/29/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/04/29/5
7
reference_url http://www.openwall.com/lists/oss-security/2016/04/29/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/04/29/8
8
reference_url http://www.ubuntu.com/usn/USN-2982-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2982-1
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1211260
reference_id 1211260
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1211260
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-4354
reference_id CVE-2016-4354
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-4354
14
reference_url https://usn.ubuntu.com/2982-1/
reference_id USN-2982-1
reference_type
scores
url https://usn.ubuntu.com/2982-1/
fixed_packages
0
url pkg:deb/debian/libksba@1.3.3-1?distro=trixie
purl pkg:deb/debian/libksba@1.3.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.3.3-1%3Fdistro=trixie
1
url pkg:deb/debian/libksba@1.5.0-3%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/libksba@1.5.0-3%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.5.0-3%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/libksba@1.6.3-2?distro=trixie
purl pkg:deb/debian/libksba@1.6.3-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.6.3-2%3Fdistro=trixie
3
url pkg:deb/debian/libksba@1.6.7-2?distro=trixie
purl pkg:deb/debian/libksba@1.6.7-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.6.7-2%3Fdistro=trixie
4
url pkg:deb/debian/libksba@1.6.8-2?distro=trixie
purl pkg:deb/debian/libksba@1.6.8-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.6.8-2%3Fdistro=trixie
aliases CVE-2016-4354
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hj28-x236-9ufu
3
url VCID-suva-8fdh-6fby
vulnerability_id VCID-suva-8fdh-6fby
summary libksba: integer overflow in the BER decoder src/ber-decoder.c (ber_decoder_s)
references
0
reference_url http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git%3Ba=commit%3Bh=aea7b6032865740478ca4b706850a5217f1c3887
reference_id
reference_type
scores
url http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git%3Ba=commit%3Bh=aea7b6032865740478ca4b706850a5217f1c3887
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4355.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4355.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4355
reference_id
reference_type
scores
0
value 0.00834
scoring_system epss
scoring_elements 0.74636
published_at 2026-04-21T12:55:00Z
1
value 0.00834
scoring_system epss
scoring_elements 0.74637
published_at 2026-04-16T12:55:00Z
2
value 0.00834
scoring_system epss
scoring_elements 0.74645
published_at 2026-04-18T12:55:00Z
3
value 0.00834
scoring_system epss
scoring_elements 0.74552
published_at 2026-04-01T12:55:00Z
4
value 0.00834
scoring_system epss
scoring_elements 0.74556
published_at 2026-04-02T12:55:00Z
5
value 0.00834
scoring_system epss
scoring_elements 0.74583
published_at 2026-04-04T12:55:00Z
6
value 0.00834
scoring_system epss
scoring_elements 0.74558
published_at 2026-04-07T12:55:00Z
7
value 0.00834
scoring_system epss
scoring_elements 0.7459
published_at 2026-04-08T12:55:00Z
8
value 0.00834
scoring_system epss
scoring_elements 0.74605
published_at 2026-04-09T12:55:00Z
9
value 0.00834
scoring_system epss
scoring_elements 0.74628
published_at 2026-04-11T12:55:00Z
10
value 0.00834
scoring_system epss
scoring_elements 0.74608
published_at 2026-04-12T12:55:00Z
11
value 0.00834
scoring_system epss
scoring_elements 0.746
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4355
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4355
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://security.gentoo.org/glsa/201604-04
reference_id
reference_type
scores
url https://security.gentoo.org/glsa/201604-04
6
reference_url http://www.openwall.com/lists/oss-security/2016/04/29/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/04/29/5
7
reference_url http://www.openwall.com/lists/oss-security/2016/04/29/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/04/29/8
8
reference_url http://www.ubuntu.com/usn/USN-2982-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2982-1
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1211260
reference_id 1211260
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1211260
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-4355
reference_id CVE-2016-4355
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-4355
14
reference_url https://usn.ubuntu.com/2982-1/
reference_id USN-2982-1
reference_type
scores
url https://usn.ubuntu.com/2982-1/
fixed_packages
0
url pkg:deb/debian/libksba@1.3.3-1?distro=trixie
purl pkg:deb/debian/libksba@1.3.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.3.3-1%3Fdistro=trixie
1
url pkg:deb/debian/libksba@1.5.0-3%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/libksba@1.5.0-3%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.5.0-3%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/libksba@1.6.3-2?distro=trixie
purl pkg:deb/debian/libksba@1.6.3-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.6.3-2%3Fdistro=trixie
3
url pkg:deb/debian/libksba@1.6.7-2?distro=trixie
purl pkg:deb/debian/libksba@1.6.7-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.6.7-2%3Fdistro=trixie
4
url pkg:deb/debian/libksba@1.6.8-2?distro=trixie
purl pkg:deb/debian/libksba@1.6.8-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.6.8-2%3Fdistro=trixie
aliases CVE-2016-4355
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-suva-8fdh-6fby
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.3.3-1%3Fdistro=trixie