{"url":"http://public2.vulnerablecode.io/api/packages/129365?format=json","purl":"pkg:rpm/redhat/krb5@1.3.4-54.el4_6?arch=1","type":"rpm","namespace":"redhat","name":"krb5","version":"1.3.4-54.el4_6","qualifiers":{"arch":"1"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46319?format=json","vulnerability_id":"VCID-n195-kd7a-b7ef","summary":"Multiple vulnerabilities have been found in MIT Kerberos 5, which could\n    allow a remote unauthenticated user to execute arbitrary code with root\n    privileges.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0063.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0063.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0063","reference_id":"","reference_type":"","scores":[{"value":"0.04904","scoring_system":"epss","scoring_elements":"0.89562","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04904","scoring_system":"epss","scoring_elements":"0.89565","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04904","scoring_system":"epss","scoring_elements":"0.89579","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04904","scoring_system":"epss","scoring_elements":"0.89595","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04904","scoring_system":"epss","scoring_elements":"0.896","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04904","scoring_system":"epss","scoring_elements":"0.89607","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04904","scoring_system":"epss","scoring_elements":"0.89614","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04904","scoring_system":"epss","scoring_elements":"0.89616","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04904","scoring_system":"epss","scoring_elements":"0.89611","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04904","scoring_system":"epss","scoring_elements":"0.89626","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04904","scoring_system":"epss","scoring_elements":"0.89629","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04904","scoring_system":"epss","scoring_elements":"0.8963","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04904","scoring_system":"epss","scoring_elements":"0.89639","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04904","scoring_system":"epss","scoring_elements":"0.89658","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04904","scoring_system":"epss","scoring_elements":"0.8967","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0063"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0063","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0063"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=432621","reference_id":"432621","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=432621"},{"reference_url":"https://security.gentoo.org/glsa/200803-31","reference_id":"GLSA-200803-31","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200803-31"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0164","reference_id":"RHSA-2008:0164","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0180","reference_id":"RHSA-2008:0180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0181","reference_id":"RHSA-2008:0181","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0181"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0182","reference_id":"RHSA-2008:0182","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0182"},{"reference_url":"https://usn.ubuntu.com/587-1/","reference_id":"USN-587-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/587-1/"}],"fixed_packages":[],"aliases":["CVE-2008-0063"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n195-kd7a-b7ef"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46314?format=json","vulnerability_id":"VCID-pw5t-tpab-vbas","summary":"Multiple vulnerabilities have been found in MIT Kerberos 5, which could\n    allow a remote unauthenticated user to execute arbitrary code with root\n    privileges.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5971.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5971.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5971","reference_id":"","reference_type":"","scores":[{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23691","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23807","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23847","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23624","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23693","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23739","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23755","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23712","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23656","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23668","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23659","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.2364","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23529","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23519","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23482","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23363","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23444","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23511","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5971"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5971","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5971"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=415351","reference_id":"415351","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=415351"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454974","reference_id":"454974","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454974"},{"reference_url":"https://security.gentoo.org/glsa/200803-31","reference_id":"GLSA-200803-31","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200803-31"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0164","reference_id":"RHSA-2008:0164","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0180","reference_id":"RHSA-2008:0180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0180"},{"reference_url":"https://usn.ubuntu.com/924-1/","reference_id":"USN-924-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/924-1/"},{"reference_url":"https://usn.ubuntu.com/940-1/","reference_id":"USN-940-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/940-1/"}],"fixed_packages":[],"aliases":["CVE-2007-5971"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pw5t-tpab-vbas"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46317?format=json","vulnerability_id":"VCID-wfcj-74db-tfg6","summary":"Multiple vulnerabilities have been found in MIT Kerberos 5, which could\n    allow a remote unauthenticated user to execute arbitrary code with root\n    privileges.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0062.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0062.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0062","reference_id":"","reference_type":"","scores":[{"value":"0.16257","scoring_system":"epss","scoring_elements":"0.9479","published_at":"2026-04-01T12:55:00Z"},{"value":"0.16257","scoring_system":"epss","scoring_elements":"0.948","published_at":"2026-04-02T12:55:00Z"},{"value":"0.16257","scoring_system":"epss","scoring_elements":"0.94803","published_at":"2026-04-04T12:55:00Z"},{"value":"0.16257","scoring_system":"epss","scoring_elements":"0.94805","published_at":"2026-04-07T12:55:00Z"},{"value":"0.16257","scoring_system":"epss","scoring_elements":"0.94814","published_at":"2026-04-08T12:55:00Z"},{"value":"0.16257","scoring_system":"epss","scoring_elements":"0.94818","published_at":"2026-04-09T12:55:00Z"},{"value":"0.16257","scoring_system":"epss","scoring_elements":"0.94822","published_at":"2026-04-11T12:55:00Z"},{"value":"0.16257","scoring_system":"epss","scoring_elements":"0.94826","published_at":"2026-04-12T12:55:00Z"},{"value":"0.16257","scoring_system":"epss","scoring_elements":"0.94827","published_at":"2026-04-13T12:55:00Z"},{"value":"0.16257","scoring_system":"epss","scoring_elements":"0.94833","published_at":"2026-04-16T12:55:00Z"},{"value":"0.16257","scoring_system":"epss","scoring_elements":"0.94836","published_at":"2026-04-18T12:55:00Z"},{"value":"0.16257","scoring_system":"epss","scoring_elements":"0.9484","published_at":"2026-04-21T12:55:00Z"},{"value":"0.16257","scoring_system":"epss","scoring_elements":"0.94842","published_at":"2026-04-26T12:55:00Z"},{"value":"0.16257","scoring_system":"epss","scoring_elements":"0.94843","published_at":"2026-04-29T12:55:00Z"},{"value":"0.16257","scoring_system":"epss","scoring_elements":"0.94851","published_at":"2026-05-05T12:55:00Z"},{"value":"0.16257","scoring_system":"epss","scoring_elements":"0.94858","published_at":"2026-05-07T12:55:00Z"},{"value":"0.16257","scoring_system":"epss","scoring_elements":"0.94869","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0062"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0062","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0062"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=432620","reference_id":"432620","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=432620"},{"reference_url":"https://security.gentoo.org/glsa/200803-31","reference_id":"GLSA-200803-31","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200803-31"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0164","reference_id":"RHSA-2008:0164","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0180","reference_id":"RHSA-2008:0180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0181","reference_id":"RHSA-2008:0181","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0181"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0182","reference_id":"RHSA-2008:0182","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0182"},{"reference_url":"https://usn.ubuntu.com/587-1/","reference_id":"USN-587-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/587-1/"}],"fixed_packages":[],"aliases":["CVE-2008-0062"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wfcj-74db-tfg6"}],"fixing_vulnerabilities":[],"risk_score":"0.1","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/krb5@1.3.4-54.el4_6%3Farch=1"}