{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","type":"deb","namespace":"debian","name":"krb5","version":"1.20.1-2+deb12u4","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"1.20.1-3","latest_non_vulnerable_version":"1.22.1-2","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88596?format=json","vulnerability_id":"VCID-13ef-rcfm-gqcn","summary":"krb5: ftpd - use of uninitialized variables","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5894.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5894.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5894","reference_id":"","reference_type":"","scores":[{"value":"0.02774","scoring_system":"epss","scoring_elements":"0.85985","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02774","scoring_system":"epss","scoring_elements":"0.85996","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02774","scoring_system":"epss","scoring_elements":"0.86013","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02774","scoring_system":"epss","scoring_elements":"0.86012","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02774","scoring_system":"epss","scoring_elements":"0.86032","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02774","scoring_system":"epss","scoring_elements":"0.86041","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02774","scoring_system":"epss","scoring_elements":"0.86055","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02774","scoring_system":"epss","scoring_elements":"0.86053","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02774","scoring_system":"epss","scoring_elements":"0.86048","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02774","scoring_system":"epss","scoring_elements":"0.86066","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02774","scoring_system":"epss","scoring_elements":"0.86071","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02774","scoring_system":"epss","scoring_elements":"0.86063","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02774","scoring_system":"epss","scoring_elements":"0.86083","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02774","scoring_system":"epss","scoring_elements":"0.86092","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5894"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5894","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5894"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=415311","reference_id":"415311","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=415311"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454974","reference_id":"454974","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454974"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926416?format=json","purl":"pkg:deb/debian/krb5@1.6.dfsg.4~beta1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.6.dfsg.4~beta1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2007-5894"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-13ef-rcfm-gqcn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89714?format=json","vulnerability_id":"VCID-297k-shb3-1fb3","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0772.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0772.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2004-0772","reference_id":"","reference_type":"","scores":[{"value":"0.04604","scoring_system":"epss","scoring_elements":"0.89204","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04604","scoring_system":"epss","scoring_elements":"0.89209","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04604","scoring_system":"epss","scoring_elements":"0.89224","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04604","scoring_system":"epss","scoring_elements":"0.89227","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04604","scoring_system":"epss","scoring_elements":"0.89244","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04604","scoring_system":"epss","scoring_elements":"0.89249","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04604","scoring_system":"epss","scoring_elements":"0.89259","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04604","scoring_system":"epss","scoring_elements":"0.89255","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04604","scoring_system":"epss","scoring_elements":"0.89252","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04604","scoring_system":"epss","scoring_elements":"0.89265","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04604","scoring_system":"epss","scoring_elements":"0.8926","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04604","scoring_system":"epss","scoring_elements":"0.89277","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04604","scoring_system":"epss","scoring_elements":"0.89283","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04604","scoring_system":"epss","scoring_elements":"0.89286","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2004-0772"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0772","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0772"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617281","reference_id":"1617281","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617281"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:052","reference_id":"RHSA-2003:052","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:052"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926405?format=json","purl":"pkg:deb/debian/krb5@1.3.4-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.3.4-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2004-0772"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-297k-shb3-1fb3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46238?format=json","vulnerability_id":"VCID-2m9u-qbs9-gqeq","summary":"Multiple vulnerabilities in MIT Kerberos 5 could potentially result in\n    remote code execution with root privileges by unauthenticated users.","references":[{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc"},{"reference_url":"http://docs.info.apple.com/article.html?artnum=306172","reference_id":"","reference_type":"","scores":[],"url":"http://docs.info.apple.com/article.html?artnum=306172"},{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02257427","reference_id":"","reference_type":"","scores":[],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02257427"},{"reference_url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=548","reference_id":"","reference_type":"","scores":[],"url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=548"},{"reference_url":"http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html"},{"reference_url":"http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html"},{"reference_url":"http://osvdb.org/36595","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/36595"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2798.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2798.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-2798","reference_id":"","reference_type":"","scores":[{"value":"0.34892","scoring_system":"epss","scoring_elements":"0.97042","published_at":"2026-04-29T12:55:00Z"},{"value":"0.34892","scoring_system":"epss","scoring_elements":"0.96992","published_at":"2026-04-01T12:55:00Z"},{"value":"0.34892","scoring_system":"epss","scoring_elements":"0.97","published_at":"2026-04-02T12:55:00Z"},{"value":"0.34892","scoring_system":"epss","scoring_elements":"0.97004","published_at":"2026-04-04T12:55:00Z"},{"value":"0.34892","scoring_system":"epss","scoring_elements":"0.97006","published_at":"2026-04-07T12:55:00Z"},{"value":"0.34892","scoring_system":"epss","scoring_elements":"0.97015","published_at":"2026-04-08T12:55:00Z"},{"value":"0.34892","scoring_system":"epss","scoring_elements":"0.97016","published_at":"2026-04-09T12:55:00Z"},{"value":"0.34892","scoring_system":"epss","scoring_elements":"0.97019","published_at":"2026-04-11T12:55:00Z"},{"value":"0.34892","scoring_system":"epss","scoring_elements":"0.9702","published_at":"2026-04-12T12:55:00Z"},{"value":"0.34892","scoring_system":"epss","scoring_elements":"0.97021","published_at":"2026-04-13T12:55:00Z"},{"value":"0.34892","scoring_system":"epss","scoring_elements":"0.9703","published_at":"2026-04-16T12:55:00Z"},{"value":"0.34892","scoring_system":"epss","scoring_elements":"0.97034","published_at":"2026-04-18T12:55:00Z"},{"value":"0.34892","scoring_system":"epss","scoring_elements":"0.97038","published_at":"2026-04-21T12:55:00Z"},{"value":"0.34892","scoring_system":"epss","scoring_elements":"0.9704","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-2798"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2798","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2798"},{"reference_url":"http://secunia.com/advisories/25800","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25800"},{"reference_url":"http://secunia.com/advisories/25801","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25801"},{"reference_url":"http://secunia.com/advisories/25814","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25814"},{"reference_url":"http://secunia.com/advisories/25821","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25821"},{"reference_url":"http://secunia.com/advisories/25870","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25870"},{"reference_url":"http://secunia.com/advisories/25875","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25875"},{"reference_url":"http://secunia.com/advisories/25888","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25888"},{"reference_url":"http://secunia.com/advisories/25890","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25890"},{"reference_url":"http://secunia.com/advisories/25894","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25894"},{"reference_url":"http://secunia.com/advisories/25911","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25911"},{"reference_url":"http://secunia.com/advisories/26033","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26033"},{"reference_url":"http://secunia.com/advisories/26228","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26228"},{"reference_url":"http://secunia.com/advisories/26235","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26235"},{"reference_url":"http://secunia.com/advisories/26909","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26909"},{"reference_url":"http://secunia.com/advisories/27706","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27706"},{"reference_url":"http://secunia.com/advisories/40346","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40346"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200707-11.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200707-11.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/35080","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/35080"},{"reference_url":"https://issues.rpath.com/browse/RPL-1499","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1499"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1726","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1726"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7550","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7550"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9996","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9996"},{"reference_url":"https://secure-support.novell.com/KanisaPlatform/Publishing/327/3675615_f.SAL_Public.html","reference_id":"","reference_type":"","scores":[],"url":"https://secure-support.novell.com/KanisaPlatform/Publishing/327/3675615_f.SAL_Public.html"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102985-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102985-1"},{"reference_url":"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2007-005.txt","reference_id":"","reference_type":"","scores":[],"url":"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2007-005.txt"},{"reference_url":"http://www.debian.org/security/2007/dsa-1323","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2007/dsa-1323"},{"reference_url":"http://www.kb.cert.org/vuls/id/554257","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/554257"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:137","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:137"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_38_krb5.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_38_krb5.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0384.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0384.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0562.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0562.html"},{"reference_url":"http://www.securityfocus.com/archive/1/472289/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/472289/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/472432/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/472432/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/472507/30/5970/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/472507/30/5970/threaded"},{"reference_url":"http://www.securityfocus.com/bid/24653","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/24653"},{"reference_url":"http://www.securityfocus.com/bid/25159","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/25159"},{"reference_url":"http://www.securitytracker.com/id?1018295","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1018295"},{"reference_url":"http://www.trustix.org/errata/2007/0021/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2007/0021/"},{"reference_url":"http://www.ubuntu.com/usn/usn-477-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-477-1"},{"reference_url":"http://www.us-cert.gov/cas/techalerts/TA07-177A.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.us-cert.gov/cas/techalerts/TA07-177A.html"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2337","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2337"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2370","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2370"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2491","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2491"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2732","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2732"},{"reference_url":"http://www.vupen.com/english/advisories/2007/3229","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/3229"},{"reference_url":"http://www.vupen.com/english/advisories/2010/1574","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/1574"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=245549","reference_id":"245549","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=245549"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=430785","reference_id":"430785","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=430785"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2798","reference_id":"CVE-2007-2798","reference_type":"","scores":[{"value":"9.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2798"},{"reference_url":"https://security.gentoo.org/glsa/200707-11","reference_id":"GLSA-200707-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200707-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0384","reference_id":"RHSA-2007:0384","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0384"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0562","reference_id":"RHSA-2007:0562","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0562"},{"reference_url":"https://usn.ubuntu.com/477-1/","reference_id":"USN-477-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/477-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926414?format=json","purl":"pkg:deb/debian/krb5@1.6.dfsg.1-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.6.dfsg.1-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2007-2798"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2m9u-qbs9-gqeq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48238?format=json","vulnerability_id":"VCID-2r3d-t5ap-tqaq","summary":"Multiple vulnerabilities in MIT Kerberos 5 could potentially result in the\n    execution of arbitrary code.","references":[{"reference_url":"http://docs.info.apple.com/article.html?artnum=305391","reference_id":"","reference_type":"","scores":[],"url":"http://docs.info.apple.com/article.html?artnum=305391"},{"reference_url":"http://fedoranews.org/cms/node/2375","reference_id":"","reference_type":"","scores":[],"url":"http://fedoranews.org/cms/node/2375"},{"reference_url":"http://fedoranews.org/cms/node/2376","reference_id":"","reference_type":"","scores":[],"url":"http://fedoranews.org/cms/node/2376"},{"reference_url":"http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html"},{"reference_url":"http://lists.suse.com/archive/suse-security-announce/2007-Jan/0004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.suse.com/archive/suse-security-announce/2007-Jan/0004.html"},{"reference_url":"http://osvdb.org/31281","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/31281"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-6143.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-6143.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-6143","reference_id":"","reference_type":"","scores":[{"value":"0.3072","scoring_system":"epss","scoring_elements":"0.96738","published_at":"2026-04-29T12:55:00Z"},{"value":"0.3072","scoring_system":"epss","scoring_elements":"0.9669","published_at":"2026-04-01T12:55:00Z"},{"value":"0.3072","scoring_system":"epss","scoring_elements":"0.967","published_at":"2026-04-02T12:55:00Z"},{"value":"0.3072","scoring_system":"epss","scoring_elements":"0.96701","published_at":"2026-04-04T12:55:00Z"},{"value":"0.3072","scoring_system":"epss","scoring_elements":"0.96706","published_at":"2026-04-07T12:55:00Z"},{"value":"0.3072","scoring_system":"epss","scoring_elements":"0.96713","published_at":"2026-04-08T12:55:00Z"},{"value":"0.3072","scoring_system":"epss","scoring_elements":"0.96715","published_at":"2026-04-09T12:55:00Z"},{"value":"0.3072","scoring_system":"epss","scoring_elements":"0.96718","published_at":"2026-04-12T12:55:00Z"},{"value":"0.3072","scoring_system":"epss","scoring_elements":"0.96721","published_at":"2026-04-13T12:55:00Z"},{"value":"0.3072","scoring_system":"epss","scoring_elements":"0.96727","published_at":"2026-04-16T12:55:00Z"},{"value":"0.3072","scoring_system":"epss","scoring_elements":"0.96731","published_at":"2026-04-18T12:55:00Z"},{"value":"0.3072","scoring_system":"epss","scoring_elements":"0.96734","published_at":"2026-04-21T12:55:00Z"},{"value":"0.3072","scoring_system":"epss","scoring_elements":"0.96733","published_at":"2026-04-24T12:55:00Z"},{"value":"0.3072","scoring_system":"epss","scoring_elements":"0.96735","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-6143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6143","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6143"},{"reference_url":"http://secunia.com/advisories/23667","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23667"},{"reference_url":"http://secunia.com/advisories/23696","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23696"},{"reference_url":"http://secunia.com/advisories/23701","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23701"},{"reference_url":"http://secunia.com/advisories/23706","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23706"},{"reference_url":"http://secunia.com/advisories/23707","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23707"},{"reference_url":"http://secunia.com/advisories/23772","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23772"},{"reference_url":"http://secunia.com/advisories/23903","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23903"},{"reference_url":"http://secunia.com/advisories/24966","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24966"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200701-21.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200701-21.xml"},{"reference_url":"http://securitytracker.com/id?1017493","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1017493"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/31422","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/31422"},{"reference_url":"https://issues.rpath.com/browse/RPL-925","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-925"},{"reference_url":"http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2006-002-rpc.txt","reference_id":"","reference_type":"","scores":[],"url":"http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2006-002-rpc.txt"},{"reference_url":"http://www.kb.cert.org/vuls/id/481564","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/481564"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:008","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:008"},{"reference_url":"http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.006.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.006.html"},{"reference_url":"http://www.securityfocus.com/archive/1/456406/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/456406/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/21970","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/21970"},{"reference_url":"http://www.ubuntu.com/usn/usn-408-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-408-1"},{"reference_url":"http://www.us-cert.gov/cas/techalerts/TA07-009B.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.us-cert.gov/cas/techalerts/TA07-009B.html"},{"reference_url":"http://www.us-cert.gov/cas/techalerts/TA07-109A.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.us-cert.gov/cas/techalerts/TA07-109A.html"},{"reference_url":"http://www.vupen.com/english/advisories/2007/0111","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/0111"},{"reference_url":"http://www.vupen.com/english/advisories/2007/1470","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/1470"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2006-6143","reference_id":"CVE-2006-6143","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-6143"},{"reference_url":"https://security.gentoo.org/glsa/200701-21","reference_id":"GLSA-200701-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200701-21"},{"reference_url":"https://usn.ubuntu.com/408-1/","reference_id":"USN-408-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/408-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926412?format=json","purl":"pkg:deb/debian/krb5@1.4.4-6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.4.4-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2006-6143"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2r3d-t5ap-tqaq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83637?format=json","vulnerability_id":"VCID-2r88-c5e9-vffv","summary":"krb5: null dereference in kadmind or DN container check bypass by supplying special crafted data","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5729.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5729.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-5729","reference_id":"","reference_type":"","scores":[{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22798","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22648","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.2266","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22652","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22967","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.23011","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22803","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22877","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22929","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22948","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22911","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22854","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22869","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22862","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22823","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-5729"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1551083","reference_id":"1551083","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1551083"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869","reference_id":"891869","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869"},{"reference_url":"https://security.archlinux.org/ASA-201806-3","reference_id":"ASA-201806-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201806-3"},{"reference_url":"https://security.archlinux.org/AVG-586","reference_id":"AVG-586","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-586"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3071","reference_id":"RHSA-2018:3071","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3071"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926459?format=json","purl":"pkg:deb/debian/krb5@1.16.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.16.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2018-5729"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2r88-c5e9-vffv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70395?format=json","vulnerability_id":"VCID-3362-hawt-17ek","summary":"krb5: Kerberos RC4-HMAC-MD5 Checksum Vulnerability Enabling Message Spoofing via MD5 Collisions","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-3576.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-3576.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-3576","reference_id":"","reference_type":"","scores":[{"value":"0.00232","scoring_system":"epss","scoring_elements":"0.45962","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00232","scoring_system":"epss","scoring_elements":"0.461","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00232","scoring_system":"epss","scoring_elements":"0.46045","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00232","scoring_system":"epss","scoring_elements":"0.46011","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00232","scoring_system":"epss","scoring_elements":"0.4602","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00232","scoring_system":"epss","scoring_elements":"0.46024","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00232","scoring_system":"epss","scoring_elements":"0.46044","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00232","scoring_system":"epss","scoring_elements":"0.45992","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00232","scoring_system":"epss","scoring_elements":"0.46048","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00232","scoring_system":"epss","scoring_elements":"0.46046","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00232","scoring_system":"epss","scoring_elements":"0.46069","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00232","scoring_system":"epss","scoring_elements":"0.46041","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00232","scoring_system":"epss","scoring_elements":"0.46049","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00232","scoring_system":"epss","scoring_elements":"0.46104","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-3576"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3576","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3576"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103525","reference_id":"1103525","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103525"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359465","reference_id":"2359465","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:11:53Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359465"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9","reference_id":"cpe:/a:redhat:discovery:2::el9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4","reference_id":"cpe:/a:redhat:openshift:4","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0","reference_id":"cpe:/o:redhat:enterprise_linux:10.0","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos","reference_id":"cpe:/o:redhat:enterprise_linux:8::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos","reference_id":"cpe:/o:redhat:enterprise_linux:9::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos","reference_id":"cpe:/o:redhat:rhel_aus:8.2::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos","reference_id":"cpe:/o:redhat:rhel_aus:8.4::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos","reference_id":"cpe:/o:redhat:rhel_aus:8.6::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos","reference_id":"cpe:/o:redhat:rhel_e4s:8.6::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.8::baseos","reference_id":"cpe:/o:redhat:rhel_e4s:8.8::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.8::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.0::baseos","reference_id":"cpe:/o:redhat:rhel_e4s:9.0::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.0::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos","reference_id":"cpe:/o:redhat:rhel_e4s:9.2::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos","reference_id":"cpe:/o:redhat:rhel_eus:9.4::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus_long_life:8.4::baseos","reference_id":"cpe:/o:redhat:rhel_eus_long_life:8.4::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus_long_life:8.4::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos","reference_id":"cpe:/o:redhat:rhel_tus:8.6::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.8::baseos","reference_id":"cpe:/o:redhat:rhel_tus:8.8::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.8::baseos"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-3576","reference_id":"CVE-2025-3576","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:11:53Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-3576"},{"reference_url":"https://web.mit.edu/kerberos/krb5-1.22/krb5-1.22.html","reference_id":"krb5-1.22.html","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:11:53Z/"}],"url":"https://web.mit.edu/kerberos/krb5-1.22/krb5-1.22.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:11487","reference_id":"RHSA-2025:11487","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:11:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:11487"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13664","reference_id":"RHSA-2025:13664","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:11:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:13664"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13777","reference_id":"RHSA-2025:13777","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:11:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:13777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15000","reference_id":"RHSA-2025:15000","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:11:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:15000"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15001","reference_id":"RHSA-2025:15001","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:11:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:15001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15002","reference_id":"RHSA-2025:15002","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:11:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:15002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15003","reference_id":"RHSA-2025:15003","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:11:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:15003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15004","reference_id":"RHSA-2025:15004","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:11:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:15004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8411","reference_id":"RHSA-2025:8411","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:11:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:8411"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9418","reference_id":"RHSA-2025:9418","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:11:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9418"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9430","reference_id":"RHSA-2025:9430","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:11:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9430"},{"reference_url":"https://usn.ubuntu.com/7542-1/","reference_id":"USN-7542-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7542-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926473?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926474?format=json","purl":"pkg:deb/debian/krb5@1.21.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2025-3576"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3362-hawt-17ek"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47300?format=json","vulnerability_id":"VCID-3du2-evy8-jfa1","summary":"Multiple vulnerabilities have been discovered in MIT krb5, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42898.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42898.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42898","reference_id":"","reference_type":"","scores":[{"value":"0.08257","scoring_system":"epss","scoring_elements":"0.92245","published_at":"2026-04-21T12:55:00Z"},{"value":"0.08257","scoring_system":"epss","scoring_elements":"0.9225","published_at":"2026-04-26T12:55:00Z"},{"value":"0.08257","scoring_system":"epss","scoring_elements":"0.92249","published_at":"2026-04-24T12:55:00Z"},{"value":"0.08734","scoring_system":"epss","scoring_elements":"0.92515","published_at":"2026-04-29T12:55:00Z"},{"value":"0.08889","scoring_system":"epss","scoring_elements":"0.9254","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08889","scoring_system":"epss","scoring_elements":"0.92532","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08889","scoring_system":"epss","scoring_elements":"0.92575","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08889","scoring_system":"epss","scoring_elements":"0.92565","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08889","scoring_system":"epss","scoring_elements":"0.92564","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08889","scoring_system":"epss","scoring_elements":"0.92558","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08889","scoring_system":"epss","scoring_elements":"0.92553","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08889","scoring_system":"epss","scoring_elements":"0.92542","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187","reference_id":"1024187","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024267","reference_id":"1024267","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024267"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2140960","reference_id":"2140960","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2140960"},{"reference_url":"https://web.mit.edu/kerberos/advisories/","reference_id":"advisories","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"}],"url":"https://web.mit.edu/kerberos/advisories/"},{"reference_url":"https://security.archlinux.org/AVG-2828","reference_id":"AVG-2828","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2828"},{"reference_url":"https://www.samba.org/samba/security/CVE-2022-42898.html","reference_id":"CVE-2022-42898.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"}],"url":"https://www.samba.org/samba/security/CVE-2022-42898.html"},{"reference_url":"https://github.com/krb5/krb5/commit/ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583","reference_id":"ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"}],"url":"https://github.com/krb5/krb5/commit/ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583"},{"reference_url":"https://github.com/heimdal/heimdal/security/advisories/GHSA-64mq-fvfj-5x3c","reference_id":"GHSA-64mq-fvfj-5x3c","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"}],"url":"https://github.com/heimdal/heimdal/security/advisories/GHSA-64mq-fvfj-5x3c"},{"reference_url":"https://security.gentoo.org/glsa/202309-06","reference_id":"GLSA-202309-06","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"}],"url":"https://security.gentoo.org/glsa/202309-06"},{"reference_url":"https://security.gentoo.org/glsa/202310-06","reference_id":"GLSA-202310-06","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"}],"url":"https://security.gentoo.org/glsa/202310-06"},{"reference_url":"https://security.gentoo.org/glsa/202405-11","reference_id":"GLSA-202405-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-11"},{"reference_url":"https://web.mit.edu/kerberos/krb5-1.19/","reference_id":"krb5-1.19","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"}],"url":"https://web.mit.edu/kerberos/krb5-1.19/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230216-0008/","reference_id":"ntap-20230216-0008","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230216-0008/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230223-0001/","reference_id":"ntap-20230223-0001","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230223-0001/"},{"reference_url":"https://web.mit.edu/kerberos/krb5-1.20/README-1.20.1.txt","reference_id":"README-1.20.1.txt","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"}],"url":"https://web.mit.edu/kerberos/krb5-1.20/README-1.20.1.txt"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8637","reference_id":"RHSA-2022:8637","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8637"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8638","reference_id":"RHSA-2022:8638","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8638"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8639","reference_id":"RHSA-2022:8639","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8639"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8640","reference_id":"RHSA-2022:8640","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8640"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8641","reference_id":"RHSA-2022:8641","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8641"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8648","reference_id":"RHSA-2022:8648","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8648"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8662","reference_id":"RHSA-2022:8662","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8662"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8663","reference_id":"RHSA-2022:8663","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8663"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8669","reference_id":"RHSA-2022:8669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8669"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:9029","reference_id":"RHSA-2022:9029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:9029"},{"reference_url":"https://bugzilla.samba.org/show_bug.cgi?id=15203","reference_id":"show_bug.cgi?id=15203","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"}],"url":"https://bugzilla.samba.org/show_bug.cgi?id=15203"},{"reference_url":"https://usn.ubuntu.com/5800-1/","reference_id":"USN-5800-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5800-1/"},{"reference_url":"https://usn.ubuntu.com/5822-1/","reference_id":"USN-5822-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5822-1/"},{"reference_url":"https://usn.ubuntu.com/5828-1/","reference_id":"USN-5828-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5828-1/"},{"reference_url":"https://usn.ubuntu.com/5936-1/","reference_id":"USN-5936-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5936-1/"},{"reference_url":"https://usn.ubuntu.com/7582-1/","reference_id":"USN-7582-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7582-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926465?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926464?format=json","purl":"pkg:deb/debian/krb5@1.20.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2022-42898"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3du2-evy8-jfa1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62430?format=json","vulnerability_id":"VCID-3e2p-t5d5-33hd","summary":"Multiple vulnerabilities have been found in MIT Kerberos 5, the\n    most severe of which may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4212.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4212.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4212","reference_id":"","reference_type":"","scores":[{"value":"0.16485","scoring_system":"epss","scoring_elements":"0.94864","published_at":"2026-04-01T12:55:00Z"},{"value":"0.16485","scoring_system":"epss","scoring_elements":"0.94874","published_at":"2026-04-02T12:55:00Z"},{"value":"0.16485","scoring_system":"epss","scoring_elements":"0.94877","published_at":"2026-04-04T12:55:00Z"},{"value":"0.16485","scoring_system":"epss","scoring_elements":"0.94879","published_at":"2026-04-07T12:55:00Z"},{"value":"0.16485","scoring_system":"epss","scoring_elements":"0.94888","published_at":"2026-04-08T12:55:00Z"},{"value":"0.16485","scoring_system":"epss","scoring_elements":"0.94892","published_at":"2026-04-09T12:55:00Z"},{"value":"0.16485","scoring_system":"epss","scoring_elements":"0.94897","published_at":"2026-04-11T12:55:00Z"},{"value":"0.16485","scoring_system":"epss","scoring_elements":"0.94899","published_at":"2026-04-12T12:55:00Z"},{"value":"0.16485","scoring_system":"epss","scoring_elements":"0.94901","published_at":"2026-04-13T12:55:00Z"},{"value":"0.16485","scoring_system":"epss","scoring_elements":"0.94908","published_at":"2026-04-16T12:55:00Z"},{"value":"0.16485","scoring_system":"epss","scoring_elements":"0.94911","published_at":"2026-04-18T12:55:00Z"},{"value":"0.16485","scoring_system":"epss","scoring_elements":"0.94915","published_at":"2026-04-29T12:55:00Z"},{"value":"0.16485","scoring_system":"epss","scoring_elements":"0.94916","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4212"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4212"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=545015","reference_id":"545015","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=545015"},{"reference_url":"https://security.gentoo.org/glsa/201201-13","reference_id":"GLSA-201201-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0029","reference_id":"RHSA-2010:0029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0029"},{"reference_url":"https://usn.ubuntu.com/881-1/","reference_id":"USN-881-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/881-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926421?format=json","purl":"pkg:deb/debian/krb5@1.8%2Bdfsg~alpha1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.8%252Bdfsg~alpha1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2009-4212"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3e2p-t5d5-33hd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46321?format=json","vulnerability_id":"VCID-456e-sucy-fug9","summary":"Multiple vulnerabilities have been found in MIT Kerberos 5, which could\n    allow a remote unauthenticated user to execute arbitrary code with root\n    privileges.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0947.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0947.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0947","reference_id":"","reference_type":"","scores":[{"value":"0.45097","scoring_system":"epss","scoring_elements":"0.97571","published_at":"2026-04-01T12:55:00Z"},{"value":"0.45097","scoring_system":"epss","scoring_elements":"0.97577","published_at":"2026-04-02T12:55:00Z"},{"value":"0.45097","scoring_system":"epss","scoring_elements":"0.9758","published_at":"2026-04-04T12:55:00Z"},{"value":"0.45097","scoring_system":"epss","scoring_elements":"0.97581","published_at":"2026-04-07T12:55:00Z"},{"value":"0.45097","scoring_system":"epss","scoring_elements":"0.97587","published_at":"2026-04-08T12:55:00Z"},{"value":"0.45097","scoring_system":"epss","scoring_elements":"0.97589","published_at":"2026-04-09T12:55:00Z"},{"value":"0.45097","scoring_system":"epss","scoring_elements":"0.97592","published_at":"2026-04-11T12:55:00Z"},{"value":"0.45097","scoring_system":"epss","scoring_elements":"0.97594","published_at":"2026-04-12T12:55:00Z"},{"value":"0.45097","scoring_system":"epss","scoring_elements":"0.97595","published_at":"2026-04-13T12:55:00Z"},{"value":"0.45097","scoring_system":"epss","scoring_elements":"0.97603","published_at":"2026-04-26T12:55:00Z"},{"value":"0.45097","scoring_system":"epss","scoring_elements":"0.97604","published_at":"2026-04-21T12:55:00Z"},{"value":"0.45097","scoring_system":"epss","scoring_elements":"0.97602","published_at":"2026-04-24T12:55:00Z"},{"value":"0.45097","scoring_system":"epss","scoring_elements":"0.97607","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0947"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=433596","reference_id":"433596","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=433596"},{"reference_url":"https://security.gentoo.org/glsa/200803-31","reference_id":"GLSA-200803-31","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200803-31"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0164","reference_id":"RHSA-2008:0164","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0164"},{"reference_url":"https://usn.ubuntu.com/587-1/","reference_id":"USN-587-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/587-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926417?format=json","purl":"pkg:deb/debian/krb5@1.6.dfsg.3~beta1-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.6.dfsg.3~beta1-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2008-0947"],"risk_score":0.2,"exploitability":"0.5","weighted_severity":"0.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-456e-sucy-fug9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49821?format=json","vulnerability_id":"VCID-4e9j-8vtc-tbda","summary":"A vulnerability has been found in MIT Kerberos 5, possibly\n    resulting in arbitrary code execution or a Denial of Service condition.","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0477.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0477.html"},{"reference_url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=8018","reference_id":"","reference_type":"","scores":[],"url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=8018"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140132.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140132.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151103.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151103.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00016.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00016.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-02/msg00044.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-02/msg00044.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5351.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5351.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-5351","reference_id":"","reference_type":"","scores":[{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57345","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57276","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57358","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57381","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57357","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57408","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57411","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57426","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57404","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57386","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57412","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57409","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57387","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57343","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57365","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-5351"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5351","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5351"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201412-53.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201412-53.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/97028","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/97028"},{"reference_url":"https://github.com/krb5/krb5/commit/af0ed4df4dfae762ab5fb605f5a0c8f59cb4f6ca","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/krb5/krb5/commit/af0ed4df4dfae762ab5fb605f5a0c8f59cb4f6ca"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:224","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:224"},{"reference_url":"http://www.securityfocus.com/bid/70380","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/70380"},{"reference_url":"http://www.securitytracker.com/id/1031003","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1031003"},{"reference_url":"http://www.ubuntu.com/usn/USN-2498-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2498-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1145425","reference_id":"1145425","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1145425"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762479","reference_id":"762479","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762479"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-5351","reference_id":"CVE-2014-5351","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-5351"},{"reference_url":"https://security.gentoo.org/glsa/201412-53","reference_id":"GLSA-201412-53","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-53"},{"reference_url":"https://usn.ubuntu.com/2498-1/","reference_id":"USN-2498-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2498-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926445?format=json","purl":"pkg:deb/debian/krb5@1.12.1%2Bdfsg-10?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-10%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2014-5351"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4e9j-8vtc-tbda"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89723?format=json","vulnerability_id":"VCID-4vzx-hyh9-pubu","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0138.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0138.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2003-0138","reference_id":"","reference_type":"","scores":[{"value":"0.05644","scoring_system":"epss","scoring_elements":"0.90313","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05644","scoring_system":"epss","scoring_elements":"0.90316","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05644","scoring_system":"epss","scoring_elements":"0.90328","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05644","scoring_system":"epss","scoring_elements":"0.90332","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05644","scoring_system":"epss","scoring_elements":"0.90346","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05644","scoring_system":"epss","scoring_elements":"0.90353","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05644","scoring_system":"epss","scoring_elements":"0.90361","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05644","scoring_system":"epss","scoring_elements":"0.9036","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05644","scoring_system":"epss","scoring_elements":"0.90354","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05644","scoring_system":"epss","scoring_elements":"0.90369","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05644","scoring_system":"epss","scoring_elements":"0.90367","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05644","scoring_system":"epss","scoring_elements":"0.90382","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05644","scoring_system":"epss","scoring_elements":"0.90378","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2003-0138"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0138","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0138"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1616981","reference_id":"1616981","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1616981"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:051","reference_id":"RHSA-2003:051","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:051"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:052","reference_id":"RHSA-2003:052","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:052"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:091","reference_id":"RHSA-2003:091","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:091"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:168","reference_id":"RHSA-2003:168","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:168"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926404?format=json","purl":"pkg:deb/debian/krb5@1.2.7-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.2.7-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2003-0138"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4vzx-hyh9-pubu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46237?format=json","vulnerability_id":"VCID-4xhj-p3vp-wqgk","summary":"Multiple vulnerabilities in MIT Kerberos 5 could potentially result in\n    remote code execution with root privileges by unauthenticated users.","references":[{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc"},{"reference_url":"http://docs.info.apple.com/article.html?artnum=306172","reference_id":"","reference_type":"","scores":[],"url":"http://docs.info.apple.com/article.html?artnum=306172"},{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02257427","reference_id":"","reference_type":"","scores":[],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02257427"},{"reference_url":"http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html"},{"reference_url":"http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html"},{"reference_url":"http://osvdb.org/36597","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/36597"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2443.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2443.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-2443","reference_id":"","reference_type":"","scores":[{"value":"0.32345","scoring_system":"epss","scoring_elements":"0.96859","published_at":"2026-04-29T12:55:00Z"},{"value":"0.32345","scoring_system":"epss","scoring_elements":"0.96815","published_at":"2026-04-01T12:55:00Z"},{"value":"0.32345","scoring_system":"epss","scoring_elements":"0.96822","published_at":"2026-04-02T12:55:00Z"},{"value":"0.32345","scoring_system":"epss","scoring_elements":"0.96823","published_at":"2026-04-04T12:55:00Z"},{"value":"0.32345","scoring_system":"epss","scoring_elements":"0.96827","published_at":"2026-04-07T12:55:00Z"},{"value":"0.32345","scoring_system":"epss","scoring_elements":"0.96835","published_at":"2026-04-08T12:55:00Z"},{"value":"0.32345","scoring_system":"epss","scoring_elements":"0.96836","published_at":"2026-04-09T12:55:00Z"},{"value":"0.32345","scoring_system":"epss","scoring_elements":"0.96839","published_at":"2026-04-12T12:55:00Z"},{"value":"0.32345","scoring_system":"epss","scoring_elements":"0.9684","published_at":"2026-04-13T12:55:00Z"},{"value":"0.32345","scoring_system":"epss","scoring_elements":"0.96847","published_at":"2026-04-16T12:55:00Z"},{"value":"0.32345","scoring_system":"epss","scoring_elements":"0.96851","published_at":"2026-04-18T12:55:00Z"},{"value":"0.32345","scoring_system":"epss","scoring_elements":"0.96853","published_at":"2026-04-21T12:55:00Z"},{"value":"0.32345","scoring_system":"epss","scoring_elements":"0.96854","published_at":"2026-04-24T12:55:00Z"},{"value":"0.32345","scoring_system":"epss","scoring_elements":"0.96856","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-2443"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2443","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2443"},{"reference_url":"http://secunia.com/advisories/25800","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25800"},{"reference_url":"http://secunia.com/advisories/25801","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25801"},{"reference_url":"http://secunia.com/advisories/25814","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25814"},{"reference_url":"http://secunia.com/advisories/25821","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25821"},{"reference_url":"http://secunia.com/advisories/25870","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25870"},{"reference_url":"http://secunia.com/advisories/25888","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25888"},{"reference_url":"http://secunia.com/advisories/25890","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25890"},{"reference_url":"http://secunia.com/advisories/25894","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25894"},{"reference_url":"http://secunia.com/advisories/25911","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25911"},{"reference_url":"http://secunia.com/advisories/26033","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26033"},{"reference_url":"http://secunia.com/advisories/26228","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26228"},{"reference_url":"http://secunia.com/advisories/26235","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26235"},{"reference_url":"http://secunia.com/advisories/26909","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26909"},{"reference_url":"http://secunia.com/advisories/27706","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27706"},{"reference_url":"http://secunia.com/advisories/40346","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40346"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200707-11.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200707-11.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/35085","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/35085"},{"reference_url":"https://issues.rpath.com/browse/RPL-1499","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1499"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11277","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11277"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7131","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7131"},{"reference_url":"https://secure-support.novell.com/KanisaPlatform/Publishing/773/3248163_f.SAL_Public.html","reference_id":"","reference_type":"","scores":[],"url":"https://secure-support.novell.com/KanisaPlatform/Publishing/773/3248163_f.SAL_Public.html"},{"reference_url":"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2007-004.txt","reference_id":"","reference_type":"","scores":[],"url":"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2007-004.txt"},{"reference_url":"http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-004.txt","reference_id":"","reference_type":"","scores":[],"url":"http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-004.txt"},{"reference_url":"http://www.debian.org/security/2007/dsa-1323","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2007/dsa-1323"},{"reference_url":"http://www.kb.cert.org/vuls/id/365313","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/365313"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:137","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:137"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_38_krb5.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_38_krb5.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0384.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0384.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0562.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0562.html"},{"reference_url":"http://www.securityfocus.com/archive/1/472288/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/472288/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/472432/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/472432/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/472507/30/5970/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/472507/30/5970/threaded"},{"reference_url":"http://www.securityfocus.com/bid/24657","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/24657"},{"reference_url":"http://www.securityfocus.com/bid/25159","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/25159"},{"reference_url":"http://www.securitytracker.com/id?1018293","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1018293"},{"reference_url":"http://www.trustix.org/errata/2007/0021/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2007/0021/"},{"reference_url":"http://www.ubuntu.com/usn/usn-477-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-477-1"},{"reference_url":"http://www.us-cert.gov/cas/techalerts/TA07-177A.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.us-cert.gov/cas/techalerts/TA07-177A.html"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2337","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2337"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2491","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2491"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2732","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2732"},{"reference_url":"http://www.vupen.com/english/advisories/2007/3229","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/3229"},{"reference_url":"http://www.vupen.com/english/advisories/2010/1574","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/1574"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=245548","reference_id":"245548","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=245548"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=430787","reference_id":"430787","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=430787"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2443","reference_id":"CVE-2007-2443","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv2","scoring_elements":"AV:A/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2443"},{"reference_url":"https://security.gentoo.org/glsa/200707-11","reference_id":"GLSA-200707-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200707-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0384","reference_id":"RHSA-2007:0384","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0384"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0562","reference_id":"RHSA-2007:0562","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0562"},{"reference_url":"https://usn.ubuntu.com/477-1/","reference_id":"USN-477-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/477-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926414?format=json","purl":"pkg:deb/debian/krb5@1.6.dfsg.1-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.6.dfsg.1-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2007-2443"],"risk_score":3.8,"exploitability":"0.5","weighted_severity":"7.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4xhj-p3vp-wqgk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41392?format=json","vulnerability_id":"VCID-4xpe-hb37-5qdm","summary":"Multiple vulnerabilities have been discovered in MIT Kerberos 5,\n    allowing execution of arbitrary code or Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1014.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1014.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1014","reference_id":"","reference_type":"","scores":[{"value":"0.04152","scoring_system":"epss","scoring_elements":"0.887","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04152","scoring_system":"epss","scoring_elements":"0.88617","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04152","scoring_system":"epss","scoring_elements":"0.88626","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04152","scoring_system":"epss","scoring_elements":"0.88642","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04152","scoring_system":"epss","scoring_elements":"0.88644","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04152","scoring_system":"epss","scoring_elements":"0.88662","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04152","scoring_system":"epss","scoring_elements":"0.88666","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04152","scoring_system":"epss","scoring_elements":"0.88679","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04152","scoring_system":"epss","scoring_elements":"0.88672","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04152","scoring_system":"epss","scoring_elements":"0.88685","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04152","scoring_system":"epss","scoring_elements":"0.88682","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04152","scoring_system":"epss","scoring_elements":"0.8868","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04152","scoring_system":"epss","scoring_elements":"0.88695","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04152","scoring_system":"epss","scoring_elements":"0.88701","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1014"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1014","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1014"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683429","reference_id":"683429","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683429"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=838014","reference_id":"838014","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=838014"},{"reference_url":"https://security.gentoo.org/glsa/201312-12","reference_id":"GLSA-201312-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201312-12"},{"reference_url":"https://usn.ubuntu.com/1520-1/","reference_id":"USN-1520-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1520-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926437?format=json","purl":"pkg:deb/debian/krb5@1.10.1%2Bdfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2012-1014"],"risk_score":1.0,"exploitability":"0.5","weighted_severity":"2.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4xpe-hb37-5qdm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86034?format=json","vulnerability_id":"VCID-51sv-1nva-eqey","summary":"krb5: NULL pointer dereference when using a ticket policy name as a password policy name","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0536.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0536.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155828.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155828.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-03/msg00061.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-03/msg00061.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0439.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-0439.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0794.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-0794.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5353.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5353.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-5353","reference_id":"","reference_type":"","scores":[{"value":"0.00652","scoring_system":"epss","scoring_elements":"0.70964","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00652","scoring_system":"epss","scoring_elements":"0.70811","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00652","scoring_system":"epss","scoring_elements":"0.70825","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00652","scoring_system":"epss","scoring_elements":"0.70843","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00652","scoring_system":"epss","scoring_elements":"0.70818","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00652","scoring_system":"epss","scoring_elements":"0.70862","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00652","scoring_system":"epss","scoring_elements":"0.70878","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00652","scoring_system":"epss","scoring_elements":"0.70901","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00652","scoring_system":"epss","scoring_elements":"0.70885","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00652","scoring_system":"epss","scoring_elements":"0.7087","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00652","scoring_system":"epss","scoring_elements":"0.70916","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00652","scoring_system":"epss","scoring_elements":"0.70922","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00652","scoring_system":"epss","scoring_elements":"0.70902","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00652","scoring_system":"epss","scoring_elements":"0.70956","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00652","scoring_system":"epss","scoring_elements":"0.70966","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-5353"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773226","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773226"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5353","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5353"},{"reference_url":"https://github.com/krb5/krb5/commit/d1f707024f1d0af6e54a18885322d70fa15ec4d3","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/krb5/krb5/commit/d1f707024f1d0af6e54a18885322d70fa15ec4d3"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:009","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:009"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"},{"reference_url":"http://www.securityfocus.com/bid/71679","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71679"},{"reference_url":"http://www.securitytracker.com/id/1031376","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1031376"},{"reference_url":"http://www.ubuntu.com/usn/USN-2498-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2498-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1174543","reference_id":"1174543","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1174543"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-5353","reference_id":"CVE-2014-5353","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-5353"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0439","reference_id":"RHSA-2015:0439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0794","reference_id":"RHSA-2015:0794","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0794"},{"reference_url":"https://usn.ubuntu.com/2498-1/","reference_id":"USN-2498-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2498-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926447?format=json","purl":"pkg:deb/debian/krb5@1.12.1%2Bdfsg-16?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-16%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2014-5353"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-51sv-1nva-eqey"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86033?format=json","vulnerability_id":"VCID-5np7-5bb3-wbfx","summary":"krb5: unauthenticated denial of service in recvauth_common() and others","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5355.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5355.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-5355","reference_id":"","reference_type":"","scores":[{"value":"0.09423","scoring_system":"epss","scoring_elements":"0.92814","published_at":"2026-04-29T12:55:00Z"},{"value":"0.09423","scoring_system":"epss","scoring_elements":"0.92769","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09423","scoring_system":"epss","scoring_elements":"0.92776","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09423","scoring_system":"epss","scoring_elements":"0.92781","published_at":"2026-04-04T12:55:00Z"},{"value":"0.09423","scoring_system":"epss","scoring_elements":"0.92778","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09423","scoring_system":"epss","scoring_elements":"0.92787","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09423","scoring_system":"epss","scoring_elements":"0.92792","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09423","scoring_system":"epss","scoring_elements":"0.92796","published_at":"2026-04-11T12:55:00Z"},{"value":"0.09423","scoring_system":"epss","scoring_elements":"0.92795","published_at":"2026-04-13T12:55:00Z"},{"value":"0.09423","scoring_system":"epss","scoring_elements":"0.92806","published_at":"2026-04-16T12:55:00Z"},{"value":"0.09423","scoring_system":"epss","scoring_elements":"0.92807","published_at":"2026-04-18T12:55:00Z"},{"value":"0.09423","scoring_system":"epss","scoring_elements":"0.92811","published_at":"2026-04-21T12:55:00Z"},{"value":"0.09423","scoring_system":"epss","scoring_elements":"0.92818","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-5355"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5355","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5355"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1193939","reference_id":"1193939","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1193939"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778647","reference_id":"778647","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778647"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0794","reference_id":"RHSA-2015:0794","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0794"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2154","reference_id":"RHSA-2015:2154","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2154"},{"reference_url":"https://usn.ubuntu.com/2810-1/","reference_id":"USN-2810-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2810-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926448?format=json","purl":"pkg:deb/debian/krb5@1.12.1%2Bdfsg-18?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-18%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2014-5355"],"risk_score":1.2,"exploitability":"0.5","weighted_severity":"2.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5np7-5bb3-wbfx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86784?format=json","vulnerability_id":"VCID-5s5f-d1ue-gfda","summary":"krb5: PKINIT null pointer deref leads to DoS","references":[{"reference_url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=7527","reference_id":"","reference_type":"","scores":[],"url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=7527"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1016.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1016.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1016","reference_id":"","reference_type":"","scores":[{"value":"0.00643","scoring_system":"epss","scoring_elements":"0.70713","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00643","scoring_system":"epss","scoring_elements":"0.70556","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00643","scoring_system":"epss","scoring_elements":"0.7057","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00643","scoring_system":"epss","scoring_elements":"0.70587","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00643","scoring_system":"epss","scoring_elements":"0.70565","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00643","scoring_system":"epss","scoring_elements":"0.70611","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00643","scoring_system":"epss","scoring_elements":"0.70626","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00643","scoring_system":"epss","scoring_elements":"0.70649","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00643","scoring_system":"epss","scoring_elements":"0.70634","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00643","scoring_system":"epss","scoring_elements":"0.7062","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00643","scoring_system":"epss","scoring_elements":"0.70665","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00643","scoring_system":"epss","scoring_elements":"0.70673","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00643","scoring_system":"epss","scoring_elements":"0.70652","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00643","scoring_system":"epss","scoring_elements":"0.70704","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00643","scoring_system":"epss","scoring_elements":"0.70714","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1016"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1016","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1016"},{"reference_url":"http://secunia.com/advisories/55040","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/55040"},{"reference_url":"https://github.com/krb5/krb5/commit/db64ca25d661a47b996b4e2645998b5d7f0eb52c","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/krb5/krb5/commit/db64ca25d661a47b996b4e2645998b5d7f0eb52c"},{"reference_url":"http://web.mit.edu/kerberos/www/krb5-1.10/","reference_id":"","reference_type":"","scores":[],"url":"http://web.mit.edu/kerberos/www/krb5-1.10/"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702633","reference_id":"702633","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702633"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=917840","reference_id":"917840","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=917840"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-1016","reference_id":"CVE-2012-1016","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-1016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0656","reference_id":"RHSA-2013:0656","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0656"},{"reference_url":"https://usn.ubuntu.com/2310-1/","reference_id":"USN-2310-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2310-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926438?format=json","purl":"pkg:deb/debian/krb5@1.10.1%2Bdfsg-4%2Bnmu1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-4%252Bnmu1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2012-1016"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5s5f-d1ue-gfda"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62441?format=json","vulnerability_id":"VCID-5txn-a4x1-nbbe","summary":"Multiple vulnerabilities have been found in MIT Kerberos 5, the\n    most severe of which may allow remote execution of arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html"},{"reference_url":"http://mailman.mit.edu/pipermail/kerberos/2010-December/016800.html","reference_id":"","reference_type":"","scores":[],"url":"http://mailman.mit.edu/pipermail/kerberos/2010-December/016800.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0281.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0281.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0281","reference_id":"","reference_type":"","scores":[{"value":"0.10754","scoring_system":"epss","scoring_elements":"0.93365","published_at":"2026-04-29T12:55:00Z"},{"value":"0.10754","scoring_system":"epss","scoring_elements":"0.93307","published_at":"2026-04-01T12:55:00Z"},{"value":"0.10754","scoring_system":"epss","scoring_elements":"0.93316","published_at":"2026-04-02T12:55:00Z"},{"value":"0.10754","scoring_system":"epss","scoring_elements":"0.93321","published_at":"2026-04-04T12:55:00Z"},{"value":"0.10754","scoring_system":"epss","scoring_elements":"0.9332","published_at":"2026-04-07T12:55:00Z"},{"value":"0.10754","scoring_system":"epss","scoring_elements":"0.93328","published_at":"2026-04-08T12:55:00Z"},{"value":"0.10754","scoring_system":"epss","scoring_elements":"0.93333","published_at":"2026-04-09T12:55:00Z"},{"value":"0.10754","scoring_system":"epss","scoring_elements":"0.93337","published_at":"2026-04-13T12:55:00Z"},{"value":"0.10754","scoring_system":"epss","scoring_elements":"0.93336","published_at":"2026-04-12T12:55:00Z"},{"value":"0.10754","scoring_system":"epss","scoring_elements":"0.93354","published_at":"2026-04-16T12:55:00Z"},{"value":"0.10754","scoring_system":"epss","scoring_elements":"0.93359","published_at":"2026-04-18T12:55:00Z"},{"value":"0.10754","scoring_system":"epss","scoring_elements":"0.93366","published_at":"2026-04-21T12:55:00Z"},{"value":"0.10754","scoring_system":"epss","scoring_elements":"0.93371","published_at":"2026-04-24T12:55:00Z"},{"value":"0.10754","scoring_system":"epss","scoring_elements":"0.93367","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0281"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0281","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0281"},{"reference_url":"http://secunia.com/advisories/43260","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43260"},{"reference_url":"http://secunia.com/advisories/43273","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43273"},{"reference_url":"http://secunia.com/advisories/43275","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43275"},{"reference_url":"http://secunia.com/advisories/46397","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/46397"},{"reference_url":"http://securityreason.com/securityalert/8073","reference_id":"","reference_type":"","scores":[],"url":"http://securityreason.com/securityalert/8073"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/65324","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/65324"},{"reference_url":"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-002.txt","reference_id":"","reference_type":"","scores":[],"url":"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-002.txt"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:024","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:024"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:025","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:025"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0199.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0199.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0200.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0200.html"},{"reference_url":"http://www.securityfocus.com/archive/1/516299/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/516299/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/520102/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/520102/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/46265","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/46265"},{"reference_url":"http://www.securitytracker.com/id?1025037","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1025037"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0330","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0330"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0333","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0333"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0347","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0347"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0464","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0464"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=668719","reference_id":"668719","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=668719"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos:5-1.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-0281","reference_id":"CVE-2011-0281","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-0281"},{"reference_url":"https://security.gentoo.org/glsa/201201-13","reference_id":"GLSA-201201-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0199","reference_id":"RHSA-2011:0199","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0199"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0200","reference_id":"RHSA-2011:0200","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0200"},{"reference_url":"https://usn.ubuntu.com/1062-1/","reference_id":"USN-1062-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1062-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926429?format=json","purl":"pkg:deb/debian/krb5@1.8.3%2Bdfsg-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.8.3%252Bdfsg-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2011-0281"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5txn-a4x1-nbbe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87067?format=json","vulnerability_id":"VCID-5z7g-r4bh-2qb1","summary":"krb5: kadmind denial of service","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1013.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1013.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1013","reference_id":"","reference_type":"","scores":[{"value":"0.01042","scoring_system":"epss","scoring_elements":"0.77392","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01042","scoring_system":"epss","scoring_elements":"0.77399","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01042","scoring_system":"epss","scoring_elements":"0.77425","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01042","scoring_system":"epss","scoring_elements":"0.77405","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01042","scoring_system":"epss","scoring_elements":"0.77435","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01042","scoring_system":"epss","scoring_elements":"0.77445","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01042","scoring_system":"epss","scoring_elements":"0.77471","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01042","scoring_system":"epss","scoring_elements":"0.77451","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01042","scoring_system":"epss","scoring_elements":"0.77447","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01042","scoring_system":"epss","scoring_elements":"0.77487","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01042","scoring_system":"epss","scoring_elements":"0.77485","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01042","scoring_system":"epss","scoring_elements":"0.77478","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01042","scoring_system":"epss","scoring_elements":"0.77513","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01042","scoring_system":"epss","scoring_elements":"0.7752","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01042","scoring_system":"epss","scoring_elements":"0.77534","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1013"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1013","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1013"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687647","reference_id":"687647","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687647"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=827517","reference_id":"827517","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=827517"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1131","reference_id":"RHSA-2012:1131","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1131"},{"reference_url":"https://usn.ubuntu.com/1520-1/","reference_id":"USN-1520-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1520-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926436?format=json","purl":"pkg:deb/debian/krb5@1.10.1%2Bdfsg-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2012-1013"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5z7g-r4bh-2qb1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89069?format=json","vulnerability_id":"VCID-5zx4-257n-ckhq","summary":"security flaw","references":[{"reference_url":"http://idefense.com/application/poi/display?id=260&type=vulnerabilities","reference_id":"","reference_type":"","scores":[],"url":"http://idefense.com/application/poi/display?id=260&type=vulnerabilities"},{"reference_url":"http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0488.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0488.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-0488","reference_id":"","reference_type":"","scores":[{"value":"0.10248","scoring_system":"epss","scoring_elements":"0.93183","published_at":"2026-04-29T12:55:00Z"},{"value":"0.10248","scoring_system":"epss","scoring_elements":"0.93123","published_at":"2026-04-01T12:55:00Z"},{"value":"0.10248","scoring_system":"epss","scoring_elements":"0.93133","published_at":"2026-04-02T12:55:00Z"},{"value":"0.10248","scoring_system":"epss","scoring_elements":"0.93137","published_at":"2026-04-04T12:55:00Z"},{"value":"0.10248","scoring_system":"epss","scoring_elements":"0.93136","published_at":"2026-04-07T12:55:00Z"},{"value":"0.10248","scoring_system":"epss","scoring_elements":"0.93144","published_at":"2026-04-08T12:55:00Z"},{"value":"0.10248","scoring_system":"epss","scoring_elements":"0.93149","published_at":"2026-04-09T12:55:00Z"},{"value":"0.10248","scoring_system":"epss","scoring_elements":"0.93154","published_at":"2026-04-11T12:55:00Z"},{"value":"0.10248","scoring_system":"epss","scoring_elements":"0.93151","published_at":"2026-04-12T12:55:00Z"},{"value":"0.10248","scoring_system":"epss","scoring_elements":"0.93153","published_at":"2026-04-13T12:55:00Z"},{"value":"0.10248","scoring_system":"epss","scoring_elements":"0.93169","published_at":"2026-04-16T12:55:00Z"},{"value":"0.10248","scoring_system":"epss","scoring_elements":"0.93173","published_at":"2026-04-18T12:55:00Z"},{"value":"0.10248","scoring_system":"epss","scoring_elements":"0.93182","published_at":"2026-04-21T12:55:00Z"},{"value":"0.10248","scoring_system":"epss","scoring_elements":"0.93187","published_at":"2026-04-24T12:55:00Z"},{"value":"0.10248","scoring_system":"epss","scoring_elements":"0.93186","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-0488"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0488","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0488"},{"reference_url":"http://secunia.com/advisories/17135","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17135"},{"reference_url":"http://secunia.com/advisories/21253","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/21253"},{"reference_url":"http://securitytracker.com/id?1014203","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1014203"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11373","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11373"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1139","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1139"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-101665-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-101665-1"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-101671-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-101671-1"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-57755-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-57755-1"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-57761-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-57761-1"},{"reference_url":"http://www.kb.cert.org/vuls/id/800829","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/800829"},{"reference_url":"http://www.novell.com/linux/security/advisories/2005_16_sr.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2005_16_sr.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-504.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-504.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-562.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-562.html"},{"reference_url":"http://www.securityfocus.com/bid/13940","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/13940"},{"reference_url":"http://www.securityfocus.com/bid/19289","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/19289"},{"reference_url":"http://www.us-cert.gov/cas/techalerts/TA06-214A.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.us-cert.gov/cas/techalerts/TA06-214A.html"},{"reference_url":"http://www.vupen.com/english/advisories/2006/3101","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2006/3101"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617531","reference_id":"1617531","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617531"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:telnet_client:5.1.2600.2180:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:microsoft:telnet_client:5.1.2600.2180:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:telnet_client:5.1.2600.2180:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:5.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:sun:sunos:5.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:5.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-0488","reference_id":"CVE-2005-0488","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-0488"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:504","reference_id":"RHSA-2005:504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:504"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:562","reference_id":"RHSA-2005:562","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:562"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926409?format=json","purl":"pkg:deb/debian/krb5@1.8.3%2Bdfsg-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.8.3%252Bdfsg-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2005-0488"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5zx4-257n-ckhq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40316?format=json","vulnerability_id":"VCID-62tb-gfsj-nfbp","summary":"Multiple vulnerabilities in MIT Kerberos 5 could potentially result in\n    unauthenticated remote root code execution.","references":[{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20070401-01-P.asc","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20070401-01-P.asc"},{"reference_url":"http://docs.info.apple.com/article.html?artnum=305391","reference_id":"","reference_type":"","scores":[],"url":"http://docs.info.apple.com/article.html?artnum=305391"},{"reference_url":"http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html"},{"reference_url":"http://lists.suse.com/archive/suse-security-announce/2007-Apr/0001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.suse.com/archive/suse-security-announce/2007-Apr/0001.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0957.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0957.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-0957","reference_id":"","reference_type":"","scores":[{"value":"0.26118","scoring_system":"epss","scoring_elements":"0.96307","published_at":"2026-04-29T12:55:00Z"},{"value":"0.26118","scoring_system":"epss","scoring_elements":"0.9625","published_at":"2026-04-01T12:55:00Z"},{"value":"0.26118","scoring_system":"epss","scoring_elements":"0.96257","published_at":"2026-04-02T12:55:00Z"},{"value":"0.26118","scoring_system":"epss","scoring_elements":"0.96265","published_at":"2026-04-04T12:55:00Z"},{"value":"0.26118","scoring_system":"epss","scoring_elements":"0.96269","published_at":"2026-04-07T12:55:00Z"},{"value":"0.26118","scoring_system":"epss","scoring_elements":"0.96278","published_at":"2026-04-08T12:55:00Z"},{"value":"0.26118","scoring_system":"epss","scoring_elements":"0.96281","published_at":"2026-04-09T12:55:00Z"},{"value":"0.26118","scoring_system":"epss","scoring_elements":"0.96286","published_at":"2026-04-12T12:55:00Z"},{"value":"0.26118","scoring_system":"epss","scoring_elements":"0.9629","published_at":"2026-04-13T12:55:00Z"},{"value":"0.26118","scoring_system":"epss","scoring_elements":"0.96298","published_at":"2026-04-16T12:55:00Z"},{"value":"0.26118","scoring_system":"epss","scoring_elements":"0.96303","published_at":"2026-04-18T12:55:00Z"},{"value":"0.26118","scoring_system":"epss","scoring_elements":"0.96304","published_at":"2026-04-24T12:55:00Z"},{"value":"0.26118","scoring_system":"epss","scoring_elements":"0.96306","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-0957"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0957","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0957"},{"reference_url":"http://secunia.com/advisories/24706","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24706"},{"reference_url":"http://secunia.com/advisories/24735","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24735"},{"reference_url":"http://secunia.com/advisories/24736","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24736"},{"reference_url":"http://secunia.com/advisories/24740","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24740"},{"reference_url":"http://secunia.com/advisories/24750","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24750"},{"reference_url":"http://secunia.com/advisories/24757","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24757"},{"reference_url":"http://secunia.com/advisories/24785","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24785"},{"reference_url":"http://secunia.com/advisories/24786","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24786"},{"reference_url":"http://secunia.com/advisories/24798","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24798"},{"reference_url":"http://secunia.com/advisories/24817","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24817"},{"reference_url":"http://secunia.com/advisories/24966","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24966"},{"reference_url":"http://secunia.com/advisories/25464","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25464"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200704-02.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200704-02.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/33411","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/33411"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10757","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10757"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102930-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102930-1"},{"reference_url":"http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-002-syslog.txt","reference_id":"","reference_type":"","scores":[],"url":"http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-002-syslog.txt"},{"reference_url":"http://www.debian.org/security/2007/dsa-1276","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2007/dsa-1276"},{"reference_url":"http://www.kb.cert.org/vuls/id/704024","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/704024"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:077","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:077"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0095.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0095.html"},{"reference_url":"http://www.securityfocus.com/archive/1/464592/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/464592/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/464666/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/464666/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/464814/30/7170/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/464814/30/7170/threaded"},{"reference_url":"http://www.securityfocus.com/bid/23285","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/23285"},{"reference_url":"http://www.securitytracker.com/id?1017849","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1017849"},{"reference_url":"http://www.ubuntu.com/usn/usn-449-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-449-1"},{"reference_url":"http://www.us-cert.gov/cas/techalerts/TA07-093B.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.us-cert.gov/cas/techalerts/TA07-093B.html"},{"reference_url":"http://www.us-cert.gov/cas/techalerts/TA07-109A.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.us-cert.gov/cas/techalerts/TA07-109A.html"},{"reference_url":"http://www.vupen.com/english/advisories/2007/1218","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/1218"},{"reference_url":"http://www.vupen.com/english/advisories/2007/1250","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/1250"},{"reference_url":"http://www.vupen.com/english/advisories/2007/1470","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/1470"},{"reference_url":"http://www.vupen.com/english/advisories/2007/1983","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/1983"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=231528","reference_id":"231528","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=231528"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-0957","reference_id":"CVE-2007-0957","reference_type":"","scores":[{"value":"9.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-0957"},{"reference_url":"https://security.gentoo.org/glsa/200704-02","reference_id":"GLSA-200704-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200704-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0095","reference_id":"RHSA-2007:0095","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0095"},{"reference_url":"https://usn.ubuntu.com/449-1/","reference_id":"USN-449-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/449-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926413?format=json","purl":"pkg:deb/debian/krb5@1.4.4-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.4.4-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2007-0957"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-62tb-gfsj-nfbp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40319?format=json","vulnerability_id":"VCID-666r-bxyt-bkcx","summary":"Multiple vulnerabilities in MIT Kerberos 5 could potentially result in\n    unauthenticated remote root code execution.","references":[{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20070401-01-P.asc","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20070401-01-P.asc"},{"reference_url":"http://docs.info.apple.com/article.html?artnum=305391","reference_id":"","reference_type":"","scores":[],"url":"http://docs.info.apple.com/article.html?artnum=305391"},{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056923","reference_id":"","reference_type":"","scores":[],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056923"},{"reference_url":"http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html"},{"reference_url":"http://lists.suse.com/archive/suse-security-announce/2007-Apr/0001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.suse.com/archive/suse-security-announce/2007-Apr/0001.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1216.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1216.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-1216","reference_id":"","reference_type":"","scores":[{"value":"0.25853","scoring_system":"epss","scoring_elements":"0.96284","published_at":"2026-04-29T12:55:00Z"},{"value":"0.25853","scoring_system":"epss","scoring_elements":"0.96226","published_at":"2026-04-01T12:55:00Z"},{"value":"0.25853","scoring_system":"epss","scoring_elements":"0.96233","published_at":"2026-04-02T12:55:00Z"},{"value":"0.25853","scoring_system":"epss","scoring_elements":"0.96241","published_at":"2026-04-04T12:55:00Z"},{"value":"0.25853","scoring_system":"epss","scoring_elements":"0.96245","published_at":"2026-04-07T12:55:00Z"},{"value":"0.25853","scoring_system":"epss","scoring_elements":"0.96254","published_at":"2026-04-08T12:55:00Z"},{"value":"0.25853","scoring_system":"epss","scoring_elements":"0.96257","published_at":"2026-04-09T12:55:00Z"},{"value":"0.25853","scoring_system":"epss","scoring_elements":"0.96261","published_at":"2026-04-12T12:55:00Z"},{"value":"0.25853","scoring_system":"epss","scoring_elements":"0.96264","published_at":"2026-04-13T12:55:00Z"},{"value":"0.25853","scoring_system":"epss","scoring_elements":"0.96273","published_at":"2026-04-16T12:55:00Z"},{"value":"0.25853","scoring_system":"epss","scoring_elements":"0.96277","published_at":"2026-04-18T12:55:00Z"},{"value":"0.25853","scoring_system":"epss","scoring_elements":"0.96279","published_at":"2026-04-21T12:55:00Z"},{"value":"0.25853","scoring_system":"epss","scoring_elements":"0.9628","published_at":"2026-04-24T12:55:00Z"},{"value":"0.25853","scoring_system":"epss","scoring_elements":"0.96282","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-1216"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1216","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1216"},{"reference_url":"http://secunia.com/advisories/24706","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24706"},{"reference_url":"http://secunia.com/advisories/24735","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24735"},{"reference_url":"http://secunia.com/advisories/24736","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24736"},{"reference_url":"http://secunia.com/advisories/24740","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24740"},{"reference_url":"http://secunia.com/advisories/24750","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24750"},{"reference_url":"http://secunia.com/advisories/24757","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24757"},{"reference_url":"http://secunia.com/advisories/24785","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24785"},{"reference_url":"http://secunia.com/advisories/24786","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24786"},{"reference_url":"http://secunia.com/advisories/24817","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24817"},{"reference_url":"http://secunia.com/advisories/24966","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24966"},{"reference_url":"http://secunia.com/advisories/25388","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25388"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200704-02.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200704-02.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/33413","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/33413"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11135","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11135"},{"reference_url":"http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-003.txt","reference_id":"","reference_type":"","scores":[],"url":"http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-003.txt"},{"reference_url":"http://www.debian.org/security/2007/dsa-1276","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2007/dsa-1276"},{"reference_url":"http://www.kb.cert.org/vuls/id/419344","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/419344"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:077","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:077"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0095.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0095.html"},{"reference_url":"http://www.securityfocus.com/archive/1/464591/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/464591/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/464666/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/464666/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/464814/30/7170/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/464814/30/7170/threaded"},{"reference_url":"http://www.securityfocus.com/bid/23282","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/23282"},{"reference_url":"http://www.securitytracker.com/id?1017852","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1017852"},{"reference_url":"http://www.ubuntu.com/usn/usn-449-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-449-1"},{"reference_url":"http://www.us-cert.gov/cas/techalerts/TA07-093B.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.us-cert.gov/cas/techalerts/TA07-093B.html"},{"reference_url":"http://www.us-cert.gov/cas/techalerts/TA07-109A.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.us-cert.gov/cas/techalerts/TA07-109A.html"},{"reference_url":"http://www.vupen.com/english/advisories/2007/1218","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/1218"},{"reference_url":"http://www.vupen.com/english/advisories/2007/1470","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/1470"},{"reference_url":"http://www.vupen.com/english/advisories/2007/1916","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/1916"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=231537","reference_id":"231537","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=231537"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-1216","reference_id":"CVE-2007-1216","reference_type":"","scores":[{"value":"9.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-1216"},{"reference_url":"https://security.gentoo.org/glsa/200704-02","reference_id":"GLSA-200704-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200704-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0095","reference_id":"RHSA-2007:0095","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0095"},{"reference_url":"https://usn.ubuntu.com/449-1/","reference_id":"USN-449-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/449-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926413?format=json","purl":"pkg:deb/debian/krb5@1.4.4-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.4.4-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2007-1216"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-666r-bxyt-bkcx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89486?format=json","vulnerability_id":"VCID-6ar9-jmrj-4qe5","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0523.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0523.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2004-0523","reference_id":"","reference_type":"","scores":[{"value":"0.25929","scoring_system":"epss","scoring_elements":"0.96233","published_at":"2026-04-01T12:55:00Z"},{"value":"0.25929","scoring_system":"epss","scoring_elements":"0.96241","published_at":"2026-04-02T12:55:00Z"},{"value":"0.25929","scoring_system":"epss","scoring_elements":"0.96248","published_at":"2026-04-04T12:55:00Z"},{"value":"0.25929","scoring_system":"epss","scoring_elements":"0.96252","published_at":"2026-04-07T12:55:00Z"},{"value":"0.25929","scoring_system":"epss","scoring_elements":"0.96261","published_at":"2026-04-08T12:55:00Z"},{"value":"0.25929","scoring_system":"epss","scoring_elements":"0.96264","published_at":"2026-04-09T12:55:00Z"},{"value":"0.25929","scoring_system":"epss","scoring_elements":"0.96269","published_at":"2026-04-11T12:55:00Z"},{"value":"0.25929","scoring_system":"epss","scoring_elements":"0.96268","published_at":"2026-04-12T12:55:00Z"},{"value":"0.25929","scoring_system":"epss","scoring_elements":"0.96271","published_at":"2026-04-13T12:55:00Z"},{"value":"0.25929","scoring_system":"epss","scoring_elements":"0.9628","published_at":"2026-04-16T12:55:00Z"},{"value":"0.25929","scoring_system":"epss","scoring_elements":"0.96285","published_at":"2026-04-18T12:55:00Z"},{"value":"0.25929","scoring_system":"epss","scoring_elements":"0.96287","published_at":"2026-04-21T12:55:00Z"},{"value":"0.25929","scoring_system":"epss","scoring_elements":"0.96288","published_at":"2026-04-24T12:55:00Z"},{"value":"0.25929","scoring_system":"epss","scoring_elements":"0.96289","published_at":"2026-04-26T12:55:00Z"},{"value":"0.25929","scoring_system":"epss","scoring_elements":"0.96291","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2004-0523"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0523","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0523"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617223","reference_id":"1617223","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617223"},{"reference_url":"https://access.redhat.com/errata/RHSA-2004:236","reference_id":"RHSA-2004:236","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2004:236"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926400?format=json","purl":"pkg:deb/debian/krb5@1.3.3-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.3.3-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2004-0523"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6ar9-jmrj-4qe5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62446?format=json","vulnerability_id":"VCID-6fgr-qbwj-bqf5","summary":"Multiple vulnerabilities have been found in MIT Kerberos 5, the\n    most severe of which may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1527.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1527.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1527","reference_id":"","reference_type":"","scores":[{"value":"0.02618","scoring_system":"epss","scoring_elements":"0.85581","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02618","scoring_system":"epss","scoring_elements":"0.85593","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02618","scoring_system":"epss","scoring_elements":"0.85611","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02618","scoring_system":"epss","scoring_elements":"0.85617","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02618","scoring_system":"epss","scoring_elements":"0.85637","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02618","scoring_system":"epss","scoring_elements":"0.85648","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02618","scoring_system":"epss","scoring_elements":"0.85663","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02618","scoring_system":"epss","scoring_elements":"0.85659","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02618","scoring_system":"epss","scoring_elements":"0.85655","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02618","scoring_system":"epss","scoring_elements":"0.85678","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02618","scoring_system":"epss","scoring_elements":"0.85683","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02618","scoring_system":"epss","scoring_elements":"0.85679","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02618","scoring_system":"epss","scoring_elements":"0.857","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02618","scoring_system":"epss","scoring_elements":"0.85712","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02618","scoring_system":"epss","scoring_elements":"0.85714","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1527"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1527","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1527"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646367","reference_id":"646367","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646367"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=737711","reference_id":"737711","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=737711"},{"reference_url":"https://security.gentoo.org/glsa/201201-13","reference_id":"GLSA-201201-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1379","reference_id":"RHSA-2011:1379","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1379"},{"reference_url":"https://usn.ubuntu.com/1233-1/","reference_id":"USN-1233-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1233-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926432?format=json","purl":"pkg:deb/debian/krb5@1.10%2Bdfsg~alpha1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10%252Bdfsg~alpha1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2011-1527"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6fgr-qbwj-bqf5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87135?format=json","vulnerability_id":"VCID-6het-dg8q-7fcj","summary":"krb5: flaw in access control handling for strings in kadmin","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1012.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1012.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1012","reference_id":"","reference_type":"","scores":[{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46839","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46878","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46895","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46842","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46896","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46918","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46891","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46898","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46954","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.4695","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46899","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46884","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46894","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46844","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1012"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1012"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=670918","reference_id":"670918","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=670918"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=796438","reference_id":"796438","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=796438"},{"reference_url":"https://usn.ubuntu.com/1520-1/","reference_id":"USN-1520-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1520-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926435?format=json","purl":"pkg:deb/debian/krb5@1.10.1%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2012-1012"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6het-dg8q-7fcj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62435?format=json","vulnerability_id":"VCID-7b71-uhtv-ubcc","summary":"Multiple vulnerabilities have been found in MIT Kerberos 5, the\n    most severe of which may allow remote execution of arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1322.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1322.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1322","reference_id":"","reference_type":"","scores":[{"value":"0.01463","scoring_system":"epss","scoring_elements":"0.8095","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01463","scoring_system":"epss","scoring_elements":"0.80814","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01463","scoring_system":"epss","scoring_elements":"0.80822","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01463","scoring_system":"epss","scoring_elements":"0.80843","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01463","scoring_system":"epss","scoring_elements":"0.80839","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01463","scoring_system":"epss","scoring_elements":"0.80867","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01463","scoring_system":"epss","scoring_elements":"0.80876","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01463","scoring_system":"epss","scoring_elements":"0.80892","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01463","scoring_system":"epss","scoring_elements":"0.80878","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01463","scoring_system":"epss","scoring_elements":"0.8087","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01463","scoring_system":"epss","scoring_elements":"0.80906","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01463","scoring_system":"epss","scoring_elements":"0.80909","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01463","scoring_system":"epss","scoring_elements":"0.8091","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01463","scoring_system":"epss","scoring_elements":"0.80931","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01463","scoring_system":"epss","scoring_elements":"0.80938","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1322"},{"reference_url":"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-006.txt","reference_id":"","reference_type":"","scores":[],"url":"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-006.txt"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:202","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:202"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0863.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0863.html"},{"reference_url":"http://www.securityfocus.com/archive/1/514144/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/514144/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/43756","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/43756"},{"reference_url":"http://www.ubuntu.com/usn/USN-999-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-999-1"},{"reference_url":"http://www.vupen.com/english/advisories/2010/2865","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/2865"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599237","reference_id":"599237","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599237"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=636335","reference_id":"636335","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=636335"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-1322","reference_id":"CVE-2010-1322","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-1322"},{"reference_url":"https://security.gentoo.org/glsa/201201-13","reference_id":"GLSA-201201-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0863","reference_id":"RHSA-2010:0863","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0863"},{"reference_url":"https://usn.ubuntu.com/999-1/","reference_id":"USN-999-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/999-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926427?format=json","purl":"pkg:deb/debian/krb5@1.8.3%2Bdfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.8.3%252Bdfsg-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2010-1322"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7b71-uhtv-ubcc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57881?format=json","vulnerability_id":"VCID-81qw-myh7-pbdj","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5352.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5352.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-5352","reference_id":"","reference_type":"","scores":[{"value":"0.05407","scoring_system":"epss","scoring_elements":"0.90166","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05407","scoring_system":"epss","scoring_elements":"0.90096","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05407","scoring_system":"epss","scoring_elements":"0.90098","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05407","scoring_system":"epss","scoring_elements":"0.9011","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05407","scoring_system":"epss","scoring_elements":"0.90114","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05407","scoring_system":"epss","scoring_elements":"0.9013","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05407","scoring_system":"epss","scoring_elements":"0.90136","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05407","scoring_system":"epss","scoring_elements":"0.90145","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05407","scoring_system":"epss","scoring_elements":"0.90144","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05407","scoring_system":"epss","scoring_elements":"0.90139","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05407","scoring_system":"epss","scoring_elements":"0.90156","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05407","scoring_system":"epss","scoring_elements":"0.90152","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05407","scoring_system":"epss","scoring_elements":"0.90168","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05407","scoring_system":"epss","scoring_elements":"0.90167","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-5352"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5352","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5352"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9421"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9422","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9422"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9423","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9423"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1179856","reference_id":"1179856","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1179856"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0439","reference_id":"RHSA-2015:0439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0794","reference_id":"RHSA-2015:0794","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0794"},{"reference_url":"https://usn.ubuntu.com/2498-1/","reference_id":"USN-2498-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2498-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926446?format=json","purl":"pkg:deb/debian/krb5@1.12.1%2Bdfsg-17?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-17%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2014-5352"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-81qw-myh7-pbdj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34395?format=json","vulnerability_id":"VCID-8bak-mpwa-s3ft","summary":"Two vulnerabilities have been found in MIT Kerberos 5, which could allow a\n    remote unauthenticated user to execute arbitrary code with root privileges.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3999.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3999.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3999","reference_id":"","reference_type":"","scores":[{"value":"0.46976","scoring_system":"epss","scoring_elements":"0.97652","published_at":"2026-04-01T12:55:00Z"},{"value":"0.46976","scoring_system":"epss","scoring_elements":"0.97658","published_at":"2026-04-02T12:55:00Z"},{"value":"0.46976","scoring_system":"epss","scoring_elements":"0.9766","published_at":"2026-04-04T12:55:00Z"},{"value":"0.46976","scoring_system":"epss","scoring_elements":"0.97661","published_at":"2026-04-07T12:55:00Z"},{"value":"0.46976","scoring_system":"epss","scoring_elements":"0.97665","published_at":"2026-04-08T12:55:00Z"},{"value":"0.46976","scoring_system":"epss","scoring_elements":"0.97668","published_at":"2026-04-09T12:55:00Z"},{"value":"0.46976","scoring_system":"epss","scoring_elements":"0.9767","published_at":"2026-04-11T12:55:00Z"},{"value":"0.46976","scoring_system":"epss","scoring_elements":"0.97673","published_at":"2026-04-12T12:55:00Z"},{"value":"0.46976","scoring_system":"epss","scoring_elements":"0.97674","published_at":"2026-04-13T12:55:00Z"},{"value":"0.46976","scoring_system":"epss","scoring_elements":"0.97681","published_at":"2026-04-16T12:55:00Z"},{"value":"0.46976","scoring_system":"epss","scoring_elements":"0.97684","published_at":"2026-04-18T12:55:00Z"},{"value":"0.46976","scoring_system":"epss","scoring_elements":"0.97682","published_at":"2026-04-21T12:55:00Z"},{"value":"0.47845","scoring_system":"epss","scoring_elements":"0.97722","published_at":"2026-04-26T12:55:00Z"},{"value":"0.47845","scoring_system":"epss","scoring_elements":"0.97728","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3999"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3999","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3999"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=250973","reference_id":"250973","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=250973"},{"reference_url":"https://security.gentoo.org/glsa/200709-01","reference_id":"GLSA-200709-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200709-01"},{"reference_url":"https://security.gentoo.org/glsa/200710-01","reference_id":"GLSA-200710-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0858","reference_id":"RHSA-2007:0858","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0858"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0913","reference_id":"RHSA-2007:0913","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0913"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0951","reference_id":"RHSA-2007:0951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0951"},{"reference_url":"https://usn.ubuntu.com/511-1/","reference_id":"USN-511-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/511-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926415?format=json","purl":"pkg:deb/debian/krb5@1.6.dfsg.1-7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.6.dfsg.1-7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2007-3999"],"risk_score":0.2,"exploitability":"0.5","weighted_severity":"0.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8bak-mpwa-s3ft"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85000?format=json","vulnerability_id":"VCID-8rxc-tf1r-wqgm","summary":"krb5: S4U2Self KDC crash when anon is restricted","references":[{"reference_url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=8458","reference_id":"","reference_type":"","scores":[],"url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=8458"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-09/msg00035.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-09/msg00035.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2591.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2591.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3120.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3120.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3120","reference_id":"","reference_type":"","scores":[{"value":"0.03262","scoring_system":"epss","scoring_elements":"0.87089","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03262","scoring_system":"epss","scoring_elements":"0.87182","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03262","scoring_system":"epss","scoring_elements":"0.87161","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03262","scoring_system":"epss","scoring_elements":"0.87175","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03262","scoring_system":"epss","scoring_elements":"0.87181","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03262","scoring_system":"epss","scoring_elements":"0.87099","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03262","scoring_system":"epss","scoring_elements":"0.87117","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03262","scoring_system":"epss","scoring_elements":"0.8711","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03262","scoring_system":"epss","scoring_elements":"0.8713","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03262","scoring_system":"epss","scoring_elements":"0.87137","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03262","scoring_system":"epss","scoring_elements":"0.87151","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03262","scoring_system":"epss","scoring_elements":"0.87145","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03262","scoring_system":"epss","scoring_elements":"0.8714","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03262","scoring_system":"epss","scoring_elements":"0.87157","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3120"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3120","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3120"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/krb5/krb5/commit/93b4a6306a0026cf1cc31ac4bd8a49ba5d034ba7","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/krb5/krb5/commit/93b4a6306a0026cf1cc31ac4bd8a49ba5d034ba7"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AWL3KYFRJIX37EAM4DKCQQIQP2WBKL35/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AWL3KYFRJIX37EAM4DKCQQIQP2WBKL35/"},{"reference_url":"http://web.mit.edu/kerberos/krb5-1.13/","reference_id":"","reference_type":"","scores":[],"url":"http://web.mit.edu/kerberos/krb5-1.13/"},{"reference_url":"http://web.mit.edu/kerberos/krb5-1.14/","reference_id":"","reference_type":"","scores":[],"url":"http://web.mit.edu/kerberos/krb5-1.14/"},{"reference_url":"http://www.securityfocus.com/bid/92132","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/92132"},{"reference_url":"http://www.securitytracker.com/id/1036442","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036442"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1361050","reference_id":"1361050","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1361050"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832572","reference_id":"832572","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832572"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.13.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.13.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.13.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.13.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.14.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.14.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3120","reference_id":"CVE-2016-3120","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3120"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2591","reference_id":"RHSA-2016:2591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2591"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926454?format=json","purl":"pkg:deb/debian/krb5@1.14.3%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.14.3%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2016-3120"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8rxc-tf1r-wqgm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62442?format=json","vulnerability_id":"VCID-8vzp-yn2u-1ugd","summary":"Multiple vulnerabilities have been found in MIT Kerberos 5, the\n    most severe of which may allow remote execution of arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0282.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0282.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0282","reference_id":"","reference_type":"","scores":[{"value":"0.09562","scoring_system":"epss","scoring_elements":"0.92881","published_at":"2026-04-29T12:55:00Z"},{"value":"0.09562","scoring_system":"epss","scoring_elements":"0.92834","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09562","scoring_system":"epss","scoring_elements":"0.92842","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09562","scoring_system":"epss","scoring_elements":"0.92845","published_at":"2026-04-04T12:55:00Z"},{"value":"0.09562","scoring_system":"epss","scoring_elements":"0.92843","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09562","scoring_system":"epss","scoring_elements":"0.92852","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09562","scoring_system":"epss","scoring_elements":"0.92856","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09562","scoring_system":"epss","scoring_elements":"0.92861","published_at":"2026-04-13T12:55:00Z"},{"value":"0.09562","scoring_system":"epss","scoring_elements":"0.9287","published_at":"2026-04-16T12:55:00Z"},{"value":"0.09562","scoring_system":"epss","scoring_elements":"0.92872","published_at":"2026-04-18T12:55:00Z"},{"value":"0.09562","scoring_system":"epss","scoring_elements":"0.92876","published_at":"2026-04-21T12:55:00Z"},{"value":"0.09562","scoring_system":"epss","scoring_elements":"0.92883","published_at":"2026-04-24T12:55:00Z"},{"value":"0.09562","scoring_system":"epss","scoring_elements":"0.92885","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0282"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0282","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0282"},{"reference_url":"http://secunia.com/advisories/43260","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43260"},{"reference_url":"http://secunia.com/advisories/43273","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43273"},{"reference_url":"http://secunia.com/advisories/43275","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43275"},{"reference_url":"http://secunia.com/advisories/46397","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/46397"},{"reference_url":"http://securityreason.com/securityalert/8073","reference_id":"","reference_type":"","scores":[],"url":"http://securityreason.com/securityalert/8073"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/65323","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/65323"},{"reference_url":"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-002.txt","reference_id":"","reference_type":"","scores":[],"url":"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-002.txt"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:024","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:024"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:025","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:025"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0199.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0199.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0200.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0200.html"},{"reference_url":"http://www.securityfocus.com/archive/1/516299/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/516299/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/520102/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/520102/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/46271","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/46271"},{"reference_url":"http://www.securitytracker.com/id?1025037","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1025037"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0330","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0330"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0333","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0333"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0347","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0347"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0464","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0464"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=668726","reference_id":"668726","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=668726"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos:5-1.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-0282","reference_id":"CVE-2011-0282","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-0282"},{"reference_url":"https://security.gentoo.org/glsa/201201-13","reference_id":"GLSA-201201-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0199","reference_id":"RHSA-2011:0199","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0199"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0200","reference_id":"RHSA-2011:0200","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0200"},{"reference_url":"https://usn.ubuntu.com/1062-1/","reference_id":"USN-1062-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1062-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926429?format=json","purl":"pkg:deb/debian/krb5@1.8.3%2Bdfsg-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.8.3%252Bdfsg-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2011-0282"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8vzp-yn2u-1ugd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87834?format=json","vulnerability_id":"VCID-8x5j-9wf8-wufr","summary":"krb5: Assertion failure in GSSAPI SPNEGO mechanism (MITKRB5-SA-2010-002)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0628.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0628.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0628","reference_id":"","reference_type":"","scores":[{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.75955","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.75958","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.75991","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.7597","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.76003","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.76018","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.76043","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.7602","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.76014","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.76055","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.76057","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.76042","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.76081","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.76091","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.76102","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0628"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=566258","reference_id":"566258","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=566258"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=575740","reference_id":"575740","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=575740"},{"reference_url":"https://usn.ubuntu.com/916-1/","reference_id":"USN-916-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/916-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926423?format=json","purl":"pkg:deb/debian/krb5@1.8%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.8%252Bdfsg-1.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2010-0628"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8x5j-9wf8-wufr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47298?format=json","vulnerability_id":"VCID-8yk4-du7p-eue4","summary":"Multiple vulnerabilities have been discovered in MIT krb5, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36222.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36222.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-36222","reference_id":"","reference_type":"","scores":[{"value":"0.06615","scoring_system":"epss","scoring_elements":"0.91219","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06615","scoring_system":"epss","scoring_elements":"0.91183","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06615","scoring_system":"epss","scoring_elements":"0.91182","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06615","scoring_system":"epss","scoring_elements":"0.91206","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06615","scoring_system":"epss","scoring_elements":"0.91209","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06615","scoring_system":"epss","scoring_elements":"0.91222","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06615","scoring_system":"epss","scoring_elements":"0.9122","published_at":"2026-04-26T12:55:00Z"},{"value":"0.09227","scoring_system":"epss","scoring_elements":"0.92711","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09227","scoring_system":"epss","scoring_elements":"0.92716","published_at":"2026-04-11T12:55:00Z"},{"value":"0.09227","scoring_system":"epss","scoring_elements":"0.92684","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09227","scoring_system":"epss","scoring_elements":"0.92696","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09227","scoring_system":"epss","scoring_elements":"0.92706","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09227","scoring_system":"epss","scoring_elements":"0.92692","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09227","scoring_system":"epss","scoring_elements":"0.92698","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-36222"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1983720","reference_id":"1983720","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1983720"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991365","reference_id":"991365","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991365"},{"reference_url":"https://security.archlinux.org/AVG-2173","reference_id":"AVG-2173","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2173"},{"reference_url":"https://security.gentoo.org/glsa/202405-11","reference_id":"GLSA-202405-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3576","reference_id":"RHSA-2021:3576","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3576"},{"reference_url":"https://usn.ubuntu.com/5959-1/","reference_id":"USN-5959-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5959-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926461?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2021-36222"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8yk4-du7p-eue4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/75052?format=json","vulnerability_id":"VCID-97k8-xbsv-87da","summary":"krb5: GSS message token handling","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-37371.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-37371.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-37371","reference_id":"","reference_type":"","scores":[{"value":"0.02606","scoring_system":"epss","scoring_elements":"0.85686","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02606","scoring_system":"epss","scoring_elements":"0.85628","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02606","scoring_system":"epss","scoring_elements":"0.85651","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02606","scoring_system":"epss","scoring_elements":"0.85656","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02606","scoring_system":"epss","scoring_elements":"0.85652","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02606","scoring_system":"epss","scoring_elements":"0.85673","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02606","scoring_system":"epss","scoring_elements":"0.85684","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02606","scoring_system":"epss","scoring_elements":"0.85568","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02606","scoring_system":"epss","scoring_elements":"0.85586","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02606","scoring_system":"epss","scoring_elements":"0.8559","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02606","scoring_system":"epss","scoring_elements":"0.8561","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02606","scoring_system":"epss","scoring_elements":"0.85621","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02606","scoring_system":"epss","scoring_elements":"0.85635","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02606","scoring_system":"epss","scoring_elements":"0.85632","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-37371"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37371","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37371"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2294676","reference_id":"2294676","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2294676"},{"reference_url":"https://github.com/krb5/krb5/commit/55fbf435edbe2e92dd8101669b1ce7144bc96fef","reference_id":"55fbf435edbe2e92dd8101669b1ce7144bc96fef","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-09T15:31:33Z/"}],"url":"https://github.com/krb5/krb5/commit/55fbf435edbe2e92dd8101669b1ce7144bc96fef"},{"reference_url":"https://web.mit.edu/kerberos/www/advisories/","reference_id":"advisories","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-09T15:31:33Z/"}],"url":"https://web.mit.edu/kerberos/www/advisories/"},{"reference_url":"https://security.archlinux.org/AVG-2856","reference_id":"AVG-2856","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2856"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10135","reference_id":"RHSA-2024:10135","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11109","reference_id":"RHSA-2024:11109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4734","reference_id":"RHSA-2024:4734","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4734"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4743","reference_id":"RHSA-2024:4743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4743"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5076","reference_id":"RHSA-2024:5076","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5076"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5312","reference_id":"RHSA-2024:5312","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5312"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5316","reference_id":"RHSA-2024:5316","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5316"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5625","reference_id":"RHSA-2024:5625","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5625"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5630","reference_id":"RHSA-2024:5630","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5630"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5643","reference_id":"RHSA-2024:5643","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5643"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5884","reference_id":"RHSA-2024:5884","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5884"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6166","reference_id":"RHSA-2024:6166","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7213","reference_id":"RHSA-2024:7213","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7213"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7374","reference_id":"RHSA-2024:7374","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7374"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1671","reference_id":"RHSA-2025:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1673","reference_id":"RHSA-2025:1673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1673"},{"reference_url":"https://usn.ubuntu.com/6947-1/","reference_id":"USN-6947-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6947-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926471?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926470?format=json","purl":"pkg:deb/debian/krb5@1.21.3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2024-37371"],"risk_score":4.1,"exploitability":"0.5","weighted_severity":"8.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-97k8-xbsv-87da"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83636?format=json","vulnerability_id":"VCID-985p-gnv3-mfd8","summary":"krb5: DN container check bypass by supplying special crafted data","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5730.json","reference_id":"","reference_type":"","scores":[{"value":"3.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5730.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-5730","reference_id":"","reference_type":"","scores":[{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62087","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62257","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62247","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62264","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62148","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62179","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62147","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62197","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62214","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62232","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62222","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62201","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62245","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62253","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62236","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-5730"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1551082","reference_id":"1551082","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1551082"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869","reference_id":"891869","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869"},{"reference_url":"https://security.archlinux.org/ASA-201806-3","reference_id":"ASA-201806-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201806-3"},{"reference_url":"https://security.archlinux.org/AVG-586","reference_id":"AVG-586","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-586"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3071","reference_id":"RHSA-2018:3071","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3071"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926459?format=json","purl":"pkg:deb/debian/krb5@1.16.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.16.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2018-5730"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-985p-gnv3-mfd8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49819?format=json","vulnerability_id":"VCID-9d6t-z5dr-yqgy","summary":"A vulnerability has been found in MIT Kerberos 5, possibly\n    resulting in arbitrary code execution or a Denial of Service condition.","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0345.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0345.html"},{"reference_url":"http://aix.software.ibm.com/aix/efixes/security/nas_advisory1.asc","reference_id":"","reference_type":"","scores":[],"url":"http://aix.software.ibm.com/aix/efixes/security/nas_advisory1.asc"},{"reference_url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=7969","reference_id":"","reference_type":"","scores":[],"url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=7969"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136360.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136360.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0439.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-0439.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4343.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4343.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-4343","reference_id":"","reference_type":"","scores":[{"value":"0.07384","scoring_system":"epss","scoring_elements":"0.91746","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07384","scoring_system":"epss","scoring_elements":"0.91687","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07384","scoring_system":"epss","scoring_elements":"0.91695","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07384","scoring_system":"epss","scoring_elements":"0.91701","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07384","scoring_system":"epss","scoring_elements":"0.91709","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07384","scoring_system":"epss","scoring_elements":"0.91721","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07384","scoring_system":"epss","scoring_elements":"0.91728","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07384","scoring_system":"epss","scoring_elements":"0.91731","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07384","scoring_system":"epss","scoring_elements":"0.91733","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07384","scoring_system":"epss","scoring_elements":"0.91729","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07384","scoring_system":"epss","scoring_elements":"0.91749","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07384","scoring_system":"epss","scoring_elements":"0.91742","published_at":"2026-04-18T12:55:00Z"},{"value":"0.07384","scoring_system":"epss","scoring_elements":"0.91744","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-4343"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4342","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4342"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4343","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4343"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4344","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4344"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345"},{"reference_url":"http://secunia.com/advisories/59102","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59102"},{"reference_url":"http://secunia.com/advisories/60082","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60082"},{"reference_url":"http://secunia.com/advisories/60448","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60448"},{"reference_url":"http://secunia.com/advisories/61052","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61052"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201412-53.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201412-53.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/95211","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/95211"},{"reference_url":"https://github.com/krb5/krb5/commit/f18ddf5d82de0ab7591a36e465bc24225776940f","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/krb5/krb5/commit/f18ddf5d82de0ab7591a36e465bc24225776940f"},{"reference_url":"http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15553.html","reference_id":"","reference_type":"","scores":[],"url":"http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15553.html"},{"reference_url":"http://www.debian.org/security/2014/dsa-3000","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3000"},{"reference_url":"http://www.osvdb.org/109390","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/109390"},{"reference_url":"http://www.securityfocus.com/bid/69159","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/69159"},{"reference_url":"http://www.securitytracker.com/id/1030706","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030706"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1121876","reference_id":"1121876","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1121876"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=755520","reference_id":"755520","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=755520"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.11.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-4343","reference_id":"CVE-2014-4343","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-4343"},{"reference_url":"https://security.gentoo.org/glsa/201412-53","reference_id":"GLSA-201412-53","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-53"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1389","reference_id":"RHSA-2014:1389","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1389"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0439","reference_id":"RHSA-2015:0439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0439"},{"reference_url":"https://usn.ubuntu.com/2310-1/","reference_id":"USN-2310-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2310-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926443?format=json","purl":"pkg:deb/debian/krb5@1.12.1%2Bdfsg-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2014-4343"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9d6t-z5dr-yqgy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84179?format=json","vulnerability_id":"VCID-9hyk-mdvc-1baq","summary":"krb5: Invalid S4U2Self or S4U2Proxy request causes assertion failure","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11368.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11368.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-11368","reference_id":"","reference_type":"","scores":[{"value":"0.00681","scoring_system":"epss","scoring_elements":"0.71555","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00681","scoring_system":"epss","scoring_elements":"0.71682","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00681","scoring_system":"epss","scoring_elements":"0.71641","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00681","scoring_system":"epss","scoring_elements":"0.71622","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00681","scoring_system":"epss","scoring_elements":"0.71672","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00681","scoring_system":"epss","scoring_elements":"0.71677","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00681","scoring_system":"epss","scoring_elements":"0.71561","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00681","scoring_system":"epss","scoring_elements":"0.71578","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00681","scoring_system":"epss","scoring_elements":"0.71551","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00681","scoring_system":"epss","scoring_elements":"0.71592","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00681","scoring_system":"epss","scoring_elements":"0.71602","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00681","scoring_system":"epss","scoring_elements":"0.71625","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00681","scoring_system":"epss","scoring_elements":"0.7161","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00681","scoring_system":"epss","scoring_elements":"0.71591","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00681","scoring_system":"epss","scoring_elements":"0.71636","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-11368"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11368","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11368"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:C"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1473560","reference_id":"1473560","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1473560"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869260","reference_id":"869260","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869260"},{"reference_url":"https://security.archlinux.org/ASA-201710-8","reference_id":"ASA-201710-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-8"},{"reference_url":"https://security.archlinux.org/AVG-414","reference_id":"AVG-414","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-414"},{"reference_url":"https://security.archlinux.org/AVG-436","reference_id":"AVG-436","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-436"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0666","reference_id":"RHSA-2018:0666","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0666"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926455?format=json","purl":"pkg:deb/debian/krb5@1.15.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.15.1-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2017-11368"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9hyk-mdvc-1baq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89429?format=json","vulnerability_id":"VCID-a4hw-gajg-fqgy","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0644.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0644.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2004-0644","reference_id":"","reference_type":"","scores":[{"value":"0.08582","scoring_system":"epss","scoring_elements":"0.92373","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08582","scoring_system":"epss","scoring_elements":"0.9238","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08582","scoring_system":"epss","scoring_elements":"0.92387","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08582","scoring_system":"epss","scoring_elements":"0.92391","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08582","scoring_system":"epss","scoring_elements":"0.92402","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08582","scoring_system":"epss","scoring_elements":"0.92407","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08582","scoring_system":"epss","scoring_elements":"0.92413","published_at":"2026-04-11T12:55:00Z"},{"value":"0.08582","scoring_system":"epss","scoring_elements":"0.92415","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08582","scoring_system":"epss","scoring_elements":"0.92414","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08582","scoring_system":"epss","scoring_elements":"0.92425","published_at":"2026-04-16T12:55:00Z"},{"value":"0.08582","scoring_system":"epss","scoring_elements":"0.92424","published_at":"2026-04-29T12:55:00Z"},{"value":"0.08582","scoring_system":"epss","scoring_elements":"0.92427","published_at":"2026-04-21T12:55:00Z"},{"value":"0.08582","scoring_system":"epss","scoring_elements":"0.9243","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2004-0644"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0644","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0644"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617248","reference_id":"1617248","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617248"},{"reference_url":"https://access.redhat.com/errata/RHSA-2004:350","reference_id":"RHSA-2004:350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2004:350"},{"reference_url":"https://access.redhat.com/errata/RHSA-2004:448","reference_id":"RHSA-2004:448","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2004:448"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926405?format=json","purl":"pkg:deb/debian/krb5@1.3.4-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.3.4-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2004-0644"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a4hw-gajg-fqgy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89405?format=json","vulnerability_id":"VCID-a9bp-26kx-p7cb","summary":"security flaw","references":[{"reference_url":"http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304","reference_id":"","reference_type":"","scores":[],"url":"http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0971.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0971.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2004-0971","reference_id":"","reference_type":"","scores":[{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28658","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29049","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29127","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29177","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28987","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29052","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29094","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29099","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29055","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29005","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29029","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29006","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28961","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28839","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28727","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2004-0971"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0971","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0971"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/17583","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/17583"},{"reference_url":"https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c%40%3Cissues.guacamole.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c%40%3Cissues.guacamole.apache.org%3E"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-012.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-012.html"},{"reference_url":"http://www.securityfocus.com/bid/11289","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/11289"},{"reference_url":"http://www.trustix.org/errata/2004/0050","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2004/0050"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617336","reference_id":"1617336","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617336"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=278271","reference_id":"278271","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=278271"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2004-0971","reference_id":"CVE-2004-0971","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2004-0971"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:012","reference_id":"RHSA-2005:012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:012"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926406?format=json","purl":"pkg:deb/debian/krb5@1.13.2%2Bdfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.13.2%252Bdfsg-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2004-0971"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a9bp-26kx-p7cb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/91082?format=json","vulnerability_id":"VCID-afnp-y7ap-ebcb","summary":"Format string vulnerabilities in the logging routines for MIT Kerberos V5 Key Distribution Center (KDC) before 1.2.5 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in Kerberos principal names.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2003-0060","reference_id":"","reference_type":"","scores":[{"value":"0.09128","scoring_system":"epss","scoring_elements":"0.92641","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09128","scoring_system":"epss","scoring_elements":"0.92648","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09128","scoring_system":"epss","scoring_elements":"0.92654","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09128","scoring_system":"epss","scoring_elements":"0.92664","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09128","scoring_system":"epss","scoring_elements":"0.92669","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09128","scoring_system":"epss","scoring_elements":"0.92675","published_at":"2026-04-11T12:55:00Z"},{"value":"0.09128","scoring_system":"epss","scoring_elements":"0.92674","published_at":"2026-04-13T12:55:00Z"},{"value":"0.09128","scoring_system":"epss","scoring_elements":"0.92688","published_at":"2026-04-18T12:55:00Z"},{"value":"0.09128","scoring_system":"epss","scoring_elements":"0.92691","published_at":"2026-04-21T12:55:00Z"},{"value":"0.09128","scoring_system":"epss","scoring_elements":"0.92693","published_at":"2026-04-26T12:55:00Z"},{"value":"0.09128","scoring_system":"epss","scoring_elements":"0.92689","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2003-0060"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0060","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0060"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926403?format=json","purl":"pkg:deb/debian/krb5@1.2.4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.2.4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2003-0060"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-afnp-y7ap-ebcb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89716?format=json","vulnerability_id":"VCID-ag2y-afz2-33gu","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0028.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0028.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2003-0028","reference_id":"","reference_type":"","scores":[{"value":"0.56051","scoring_system":"epss","scoring_elements":"0.98084","published_at":"2026-04-01T12:55:00Z"},{"value":"0.56051","scoring_system":"epss","scoring_elements":"0.98088","published_at":"2026-04-02T12:55:00Z"},{"value":"0.56051","scoring_system":"epss","scoring_elements":"0.98091","published_at":"2026-04-04T12:55:00Z"},{"value":"0.56051","scoring_system":"epss","scoring_elements":"0.98092","published_at":"2026-04-07T12:55:00Z"},{"value":"0.56051","scoring_system":"epss","scoring_elements":"0.98096","published_at":"2026-04-08T12:55:00Z"},{"value":"0.56051","scoring_system":"epss","scoring_elements":"0.98097","published_at":"2026-04-09T12:55:00Z"},{"value":"0.56051","scoring_system":"epss","scoring_elements":"0.98102","published_at":"2026-04-12T12:55:00Z"},{"value":"0.56051","scoring_system":"epss","scoring_elements":"0.98103","published_at":"2026-04-13T12:55:00Z"},{"value":"0.56051","scoring_system":"epss","scoring_elements":"0.98109","published_at":"2026-04-26T12:55:00Z"},{"value":"0.56051","scoring_system":"epss","scoring_elements":"0.98111","published_at":"2026-04-29T12:55:00Z"},{"value":"0.56051","scoring_system":"epss","scoring_elements":"0.98107","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2003-0028"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0028","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0028"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1616941","reference_id":"1616941","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1616941"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:051","reference_id":"RHSA-2003:051","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:051"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:052","reference_id":"RHSA-2003:052","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:052"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:089","reference_id":"RHSA-2003:089","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:089"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:090","reference_id":"RHSA-2003:090","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:090"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:091","reference_id":"RHSA-2003:091","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:091"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:168","reference_id":"RHSA-2003:168","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:168"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:212","reference_id":"RHSA-2003:212","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:212"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926400?format=json","purl":"pkg:deb/debian/krb5@1.3.3-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.3.3-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2003-0028"],"risk_score":0.2,"exploitability":"0.5","weighted_severity":"0.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ag2y-afz2-33gu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89155?format=json","vulnerability_id":"VCID-agwr-b1a3-jbde","summary":"security flaw","references":[{"reference_url":"ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:01.telnet.asc","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:01.telnet.asc"},{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20050405-01-P","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20050405-01-P"},{"reference_url":"http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000962","reference_id":"","reference_type":"","scores":[],"url":"http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000962"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0468.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0468.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-0468","reference_id":"","reference_type":"","scores":[{"value":"0.58537","scoring_system":"epss","scoring_elements":"0.98214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.58537","scoring_system":"epss","scoring_elements":"0.98192","published_at":"2026-04-01T12:55:00Z"},{"value":"0.58537","scoring_system":"epss","scoring_elements":"0.98196","published_at":"2026-04-02T12:55:00Z"},{"value":"0.58537","scoring_system":"epss","scoring_elements":"0.98199","published_at":"2026-04-04T12:55:00Z"},{"value":"0.58537","scoring_system":"epss","scoring_elements":"0.98201","published_at":"2026-04-07T12:55:00Z"},{"value":"0.58537","scoring_system":"epss","scoring_elements":"0.98206","published_at":"2026-04-09T12:55:00Z"},{"value":"0.58537","scoring_system":"epss","scoring_elements":"0.98209","published_at":"2026-04-13T12:55:00Z"},{"value":"0.58537","scoring_system":"epss","scoring_elements":"0.98215","published_at":"2026-04-29T12:55:00Z"},{"value":"0.58537","scoring_system":"epss","scoring_elements":"0.98216","published_at":"2026-04-26T12:55:00Z"},{"value":"0.58537","scoring_system":"epss","scoring_elements":"0.98213","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-0468"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0468","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0468"},{"reference_url":"http://secunia.com/advisories/14745","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/14745"},{"reference_url":"http://secunia.com/advisories/17899","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17899"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9640","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9640"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-101665-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-101665-1"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-101671-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-101671-1"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-57755-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-57755-1"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-57761-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-57761-1"},{"reference_url":"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-001-telnet.txt","reference_id":"","reference_type":"","scores":[],"url":"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-001-telnet.txt"},{"reference_url":"http://www.debian.de/security/2005/dsa-731","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.de/security/2005/dsa-731"},{"reference_url":"http://www.debian.org/security/2005/dsa-703","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-703"},{"reference_url":"http://www.idefense.com/application/poi/display?id=221&type=vulnerabilities","reference_id":"","reference_type":"","scores":[],"url":"http://www.idefense.com/application/poi/display?id=221&type=vulnerabilities"},{"reference_url":"http://www.kb.cert.org/vuls/id/341908","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/341908"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:061","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:061"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-327.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-327.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-330.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-330.html"},{"reference_url":"http://www.securityfocus.com/bid/12919","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/12919"},{"reference_url":"http://www.ubuntulinux.org/usn/usn-224-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntulinux.org/usn/usn-224-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617527","reference_id":"1617527","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617527"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ncsa:telnet:c:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ncsa:telnet:c:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ncsa:telnet:c:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-0468","reference_id":"CVE-2005-0468","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-0468"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/25303.txt","reference_id":"CVE-2005-0468;OSVDB-15093","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/25303.txt"},{"reference_url":"https://www.securityfocus.com/bid/12919/info","reference_id":"CVE-2005-0468;OSVDB-15093","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/12919/info"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:327","reference_id":"RHSA-2005:327","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:327"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:330","reference_id":"RHSA-2005:330","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:330"},{"reference_url":"https://usn.ubuntu.com/224-1/","reference_id":"USN-224-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/224-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926408?format=json","purl":"pkg:deb/debian/krb5@1.3.6-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.3.6-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2005-0468"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-agwr-b1a3-jbde"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41394?format=json","vulnerability_id":"VCID-ahrt-vcg3-tbc2","summary":"Multiple vulnerabilities have been discovered in MIT Kerberos 5,\n    allowing execution of arbitrary code or Denial of Service.","references":[{"reference_url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=7600","reference_id":"","reference_type":"","scores":[],"url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=7600"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102058.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102058.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102074.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102074.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-05/msg00011.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-05/msg00011.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00041.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00041.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00102.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00102.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-0748.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-0748.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1416.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1416.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1416","reference_id":"","reference_type":"","scores":[{"value":"0.02274","scoring_system":"epss","scoring_elements":"0.84719","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02274","scoring_system":"epss","scoring_elements":"0.84718","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02274","scoring_system":"epss","scoring_elements":"0.84585","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02274","scoring_system":"epss","scoring_elements":"0.84599","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02274","scoring_system":"epss","scoring_elements":"0.84619","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02274","scoring_system":"epss","scoring_elements":"0.84621","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02274","scoring_system":"epss","scoring_elements":"0.84643","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02274","scoring_system":"epss","scoring_elements":"0.84649","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02274","scoring_system":"epss","scoring_elements":"0.84667","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02274","scoring_system":"epss","scoring_elements":"0.84662","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02274","scoring_system":"epss","scoring_elements":"0.84657","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02274","scoring_system":"epss","scoring_elements":"0.84679","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02274","scoring_system":"epss","scoring_elements":"0.8468","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02274","scoring_system":"epss","scoring_elements":"0.84681","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02274","scoring_system":"epss","scoring_elements":"0.84708","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1416"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/krb5/krb5/commit/8ee70ec63931d1e38567905387ab9b1d45734d81","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/krb5/krb5/commit/8ee70ec63931d1e38567905387ab9b1d45734d81"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:157","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:157"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:158","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:158"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704775","reference_id":"704775","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704775"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=949984","reference_id":"949984","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=949984"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1416","reference_id":"CVE-2013-1416","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1416"},{"reference_url":"https://security.gentoo.org/glsa/201312-12","reference_id":"GLSA-201312-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201312-12"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0748","reference_id":"RHSA-2013:0748","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0748"},{"reference_url":"https://usn.ubuntu.com/2310-1/","reference_id":"USN-2310-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2310-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926440?format=json","purl":"pkg:deb/debian/krb5@1.10.1%2Bdfsg-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2013-1416"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ahrt-vcg3-tbc2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89724?format=json","vulnerability_id":"VCID-barq-kcw4-f3gp","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0139.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0139.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2003-0139","reference_id":"","reference_type":"","scores":[{"value":"0.04948","scoring_system":"epss","scoring_elements":"0.89611","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04948","scoring_system":"epss","scoring_elements":"0.89614","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04948","scoring_system":"epss","scoring_elements":"0.89627","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04948","scoring_system":"epss","scoring_elements":"0.89628","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04948","scoring_system":"epss","scoring_elements":"0.89644","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04948","scoring_system":"epss","scoring_elements":"0.8965","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04948","scoring_system":"epss","scoring_elements":"0.89657","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04948","scoring_system":"epss","scoring_elements":"0.89656","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04948","scoring_system":"epss","scoring_elements":"0.89649","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04948","scoring_system":"epss","scoring_elements":"0.89664","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04948","scoring_system":"epss","scoring_elements":"0.89665","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04948","scoring_system":"epss","scoring_elements":"0.89659","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04948","scoring_system":"epss","scoring_elements":"0.89675","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04948","scoring_system":"epss","scoring_elements":"0.89677","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2003-0139"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0139","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0139"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1616982","reference_id":"1616982","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1616982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:051","reference_id":"RHSA-2003:051","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:051"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:052","reference_id":"RHSA-2003:052","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:052"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:091","reference_id":"RHSA-2003:091","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:091"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:168","reference_id":"RHSA-2003:168","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:168"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926404?format=json","purl":"pkg:deb/debian/krb5@1.2.7-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.2.7-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2003-0139"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-barq-kcw4-f3gp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62450?format=json","vulnerability_id":"VCID-bdbh-trh7-8fd6","summary":"Multiple vulnerabilities have been found in MIT Kerberos 5, the\n    most severe of which may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4151.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4151.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4151","reference_id":"","reference_type":"","scores":[{"value":"0.01205","scoring_system":"epss","scoring_elements":"0.78903","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01205","scoring_system":"epss","scoring_elements":"0.78909","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01205","scoring_system":"epss","scoring_elements":"0.78938","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01205","scoring_system":"epss","scoring_elements":"0.78921","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01205","scoring_system":"epss","scoring_elements":"0.78946","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01205","scoring_system":"epss","scoring_elements":"0.78952","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01205","scoring_system":"epss","scoring_elements":"0.78975","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01205","scoring_system":"epss","scoring_elements":"0.7896","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01205","scoring_system":"epss","scoring_elements":"0.7895","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01205","scoring_system":"epss","scoring_elements":"0.78979","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01205","scoring_system":"epss","scoring_elements":"0.78976","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01205","scoring_system":"epss","scoring_elements":"0.79005","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01205","scoring_system":"epss","scoring_elements":"0.79012","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01205","scoring_system":"epss","scoring_elements":"0.79028","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4151"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4151","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4151"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646367","reference_id":"646367","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646367"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=737711","reference_id":"737711","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=737711"},{"reference_url":"https://security.gentoo.org/glsa/201201-13","reference_id":"GLSA-201201-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-13"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926432?format=json","purl":"pkg:deb/debian/krb5@1.10%2Bdfsg~alpha1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10%252Bdfsg~alpha1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2011-4151"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bdbh-trh7-8fd6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48239?format=json","vulnerability_id":"VCID-beex-9vxx-8ua1","summary":"Multiple vulnerabilities in MIT Kerberos 5 could potentially result in the\n    execution of arbitrary code.","references":[{"reference_url":"http://fedoranews.org/cms/node/2375","reference_id":"","reference_type":"","scores":[],"url":"http://fedoranews.org/cms/node/2375"},{"reference_url":"http://lists.suse.com/archive/suse-security-announce/2007-Jan/0004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.suse.com/archive/suse-security-announce/2007-Jan/0004.html"},{"reference_url":"http://osvdb.org/31280","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/31280"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-6144.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-6144.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-6144","reference_id":"","reference_type":"","scores":[{"value":"0.21928","scoring_system":"epss","scoring_elements":"0.95782","published_at":"2026-04-29T12:55:00Z"},{"value":"0.21928","scoring_system":"epss","scoring_elements":"0.95729","published_at":"2026-04-01T12:55:00Z"},{"value":"0.21928","scoring_system":"epss","scoring_elements":"0.95739","published_at":"2026-04-02T12:55:00Z"},{"value":"0.21928","scoring_system":"epss","scoring_elements":"0.95746","published_at":"2026-04-04T12:55:00Z"},{"value":"0.21928","scoring_system":"epss","scoring_elements":"0.95749","published_at":"2026-04-07T12:55:00Z"},{"value":"0.21928","scoring_system":"epss","scoring_elements":"0.95758","published_at":"2026-04-08T12:55:00Z"},{"value":"0.21928","scoring_system":"epss","scoring_elements":"0.95761","published_at":"2026-04-09T12:55:00Z"},{"value":"0.21928","scoring_system":"epss","scoring_elements":"0.95765","published_at":"2026-04-13T12:55:00Z"},{"value":"0.21928","scoring_system":"epss","scoring_elements":"0.95764","published_at":"2026-04-12T12:55:00Z"},{"value":"0.21928","scoring_system":"epss","scoring_elements":"0.95775","published_at":"2026-04-16T12:55:00Z"},{"value":"0.21928","scoring_system":"epss","scoring_elements":"0.95779","published_at":"2026-04-18T12:55:00Z"},{"value":"0.21928","scoring_system":"epss","scoring_elements":"0.95781","published_at":"2026-04-21T12:55:00Z"},{"value":"0.21928","scoring_system":"epss","scoring_elements":"0.95783","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-6144"},{"reference_url":"http://secunia.com/advisories/23690","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23690"},{"reference_url":"http://secunia.com/advisories/23701","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23701"},{"reference_url":"http://secunia.com/advisories/23706","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23706"},{"reference_url":"http://secunia.com/advisories/23903","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23903"},{"reference_url":"http://secunia.com/advisories/35151","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35151"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200701-21.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200701-21.xml"},{"reference_url":"http://securitytracker.com/id?1017494","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1017494"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/31417","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/31417"},{"reference_url":"https://issues.rpath.com/browse/RPL-925","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-925"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102772-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102772-1"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-201294-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-201294-1"},{"reference_url":"http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2006-003-mechglue.txt","reference_id":"","reference_type":"","scores":[],"url":"http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2006-003-mechglue.txt"},{"reference_url":"http://www.kb.cert.org/vuls/id/831452","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/831452"},{"reference_url":"http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.006.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.006.html"},{"reference_url":"http://www.securityfocus.com/archive/1/456409/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/456409/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/21975","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/21975"},{"reference_url":"http://www.us-cert.gov/cas/techalerts/TA07-009B.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.us-cert.gov/cas/techalerts/TA07-009B.html"},{"reference_url":"http://www.vupen.com/english/advisories/2007/0111","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/0111"},{"reference_url":"http://www.vupen.com/english/advisories/2007/0112","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/0112"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2006-6144","reference_id":"CVE-2006-6144","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-6144"},{"reference_url":"https://security.gentoo.org/glsa/200701-21","reference_id":"GLSA-200701-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200701-21"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926401?format=json","purl":"pkg:deb/debian/krb5@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2006-6144"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-beex-9vxx-8ua1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89329?format=json","vulnerability_id":"VCID-bf5x-8ek9-tucd","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-1189.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-1189.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2004-1189","reference_id":"","reference_type":"","scores":[{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25228","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.2531","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25353","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.2513","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.252","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25245","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.2526","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25218","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25165","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25174","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25164","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25132","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25074","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25062","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25017","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2004-1189"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1189","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1189"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617394","reference_id":"1617394","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617394"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:012","reference_id":"RHSA-2005:012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:045","reference_id":"RHSA-2005:045","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:045"},{"reference_url":"https://usn.ubuntu.com/58-1/","reference_id":"USN-58-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/58-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926407?format=json","purl":"pkg:deb/debian/krb5@1.3.6-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.3.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2004-1189"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bf5x-8ek9-tucd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51591?format=json","vulnerability_id":"VCID-bnpa-8svd-jyct","summary":"Multiple vulnerabilities have been discovered in MIT Kerberos 5,\n    the worst of which may allow remote attackers to cause Denial of Service.","references":[{"reference_url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=8252","reference_id":"","reference_type":"","scores":[],"url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=8252"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2697.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2697.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2697","reference_id":"","reference_type":"","scores":[{"value":"0.06393","scoring_system":"epss","scoring_elements":"0.91057","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06393","scoring_system":"epss","scoring_elements":"0.91061","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06393","scoring_system":"epss","scoring_elements":"0.90974","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06393","scoring_system":"epss","scoring_elements":"0.9098","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06393","scoring_system":"epss","scoring_elements":"0.90989","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06393","scoring_system":"epss","scoring_elements":"0.90999","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06393","scoring_system":"epss","scoring_elements":"0.91011","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06393","scoring_system":"epss","scoring_elements":"0.91017","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06393","scoring_system":"epss","scoring_elements":"0.91025","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06393","scoring_system":"epss","scoring_elements":"0.9105","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06393","scoring_system":"epss","scoring_elements":"0.91048","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06393","scoring_system":"epss","scoring_elements":"0.91063","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2697"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2695","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2695"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2696","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2696"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2697","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2697"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/krb5/krb5/commit/f0c094a1b745d91ef2f9a4eae2149aac026a5789","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/krb5/krb5/commit/f0c094a1b745d91ef2f9a4eae2149aac026a5789"},{"reference_url":"http://www.debian.org/security/2015/dsa-3395","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3395"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.securityfocus.com/bid/77581","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77581"},{"reference_url":"http://www.securitytracker.com/id/1034084","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034084"},{"reference_url":"http://www.ubuntu.com/usn/USN-2810-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2810-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1275863","reference_id":"1275863","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1275863"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=803088","reference_id":"803088","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=803088"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-2697","reference_id":"CVE-2015-2697","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-2697"},{"reference_url":"https://security.gentoo.org/glsa/201611-14","reference_id":"GLSA-201611-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201611-14"},{"reference_url":"https://usn.ubuntu.com/2810-1/","reference_id":"USN-2810-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2810-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926450?format=json","purl":"pkg:deb/debian/krb5@1.13.2%2Bdfsg-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.13.2%252Bdfsg-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2015-2697"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bnpa-8svd-jyct"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47301?format=json","vulnerability_id":"VCID-bwpn-qxzd-43g8","summary":"Multiple vulnerabilities have been discovered in MIT krb5, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-36054.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-36054.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-36054","reference_id":"","reference_type":"","scores":[{"value":"0.00648","scoring_system":"epss","scoring_elements":"0.70867","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00648","scoring_system":"epss","scoring_elements":"0.70806","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00648","scoring_system":"epss","scoring_elements":"0.70859","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00648","scoring_system":"epss","scoring_elements":"0.70868","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01116","scoring_system":"epss","scoring_elements":"0.78227","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01116","scoring_system":"epss","scoring_elements":"0.78196","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01116","scoring_system":"epss","scoring_elements":"0.78226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01116","scoring_system":"epss","scoring_elements":"0.78146","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01116","scoring_system":"epss","scoring_elements":"0.78176","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01116","scoring_system":"epss","scoring_elements":"0.78158","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01116","scoring_system":"epss","scoring_elements":"0.78185","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01116","scoring_system":"epss","scoring_elements":"0.78191","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01116","scoring_system":"epss","scoring_elements":"0.78217","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01116","scoring_system":"epss","scoring_elements":"0.78199","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-36054"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36054","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36054"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043431","reference_id":"1043431","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043431"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2230178","reference_id":"2230178","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2230178"},{"reference_url":"https://web.mit.edu/kerberos/www/advisories/","reference_id":"advisories","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T13:57:00Z/"}],"url":"https://web.mit.edu/kerberos/www/advisories/"},{"reference_url":"https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd","reference_id":"ef08b09c9459551aabbe7924fb176f1583053cdd","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T13:57:00Z/"}],"url":"https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd"},{"reference_url":"https://security.gentoo.org/glsa/202405-11","reference_id":"GLSA-202405-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-11"},{"reference_url":"https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final","reference_id":"krb5-1.20.1-final...krb5-1.20.2-final","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T13:57:00Z/"}],"url":"https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final"},{"reference_url":"https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final","reference_id":"krb5-1.21-final...krb5-1.21.1-final","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T13:57:00Z/"}],"url":"https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00031.html","reference_id":"msg00031.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T13:57:00Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00031.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230908-0004/","reference_id":"ntap-20230908-0004","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T13:57:00Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230908-0004/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6699","reference_id":"RHSA-2023:6699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6699"},{"reference_url":"https://usn.ubuntu.com/6467-1/","reference_id":"USN-6467-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6467-1/"},{"reference_url":"https://usn.ubuntu.com/6467-2/","reference_id":"USN-6467-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6467-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926467?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926466?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926468?format=json","purl":"pkg:deb/debian/krb5@1.20.1-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2023-36054"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bwpn-qxzd-43g8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89427?format=json","vulnerability_id":"VCID-c3jj-4wf4-tfex","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0642.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0642.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2004-0642","reference_id":"","reference_type":"","scores":[{"value":"0.25795","scoring_system":"epss","scoring_elements":"0.96219","published_at":"2026-04-01T12:55:00Z"},{"value":"0.25795","scoring_system":"epss","scoring_elements":"0.96226","published_at":"2026-04-02T12:55:00Z"},{"value":"0.25795","scoring_system":"epss","scoring_elements":"0.96234","published_at":"2026-04-04T12:55:00Z"},{"value":"0.25795","scoring_system":"epss","scoring_elements":"0.96238","published_at":"2026-04-07T12:55:00Z"},{"value":"0.25795","scoring_system":"epss","scoring_elements":"0.96247","published_at":"2026-04-08T12:55:00Z"},{"value":"0.25795","scoring_system":"epss","scoring_elements":"0.9625","published_at":"2026-04-09T12:55:00Z"},{"value":"0.25795","scoring_system":"epss","scoring_elements":"0.96254","published_at":"2026-04-12T12:55:00Z"},{"value":"0.25795","scoring_system":"epss","scoring_elements":"0.96255","published_at":"2026-04-13T12:55:00Z"},{"value":"0.25795","scoring_system":"epss","scoring_elements":"0.96264","published_at":"2026-04-16T12:55:00Z"},{"value":"0.25795","scoring_system":"epss","scoring_elements":"0.96268","published_at":"2026-04-18T12:55:00Z"},{"value":"0.25795","scoring_system":"epss","scoring_elements":"0.96269","published_at":"2026-04-21T12:55:00Z"},{"value":"0.25795","scoring_system":"epss","scoring_elements":"0.9627","published_at":"2026-04-24T12:55:00Z"},{"value":"0.25795","scoring_system":"epss","scoring_elements":"0.96272","published_at":"2026-04-26T12:55:00Z"},{"value":"0.25795","scoring_system":"epss","scoring_elements":"0.96274","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2004-0642"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0642","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0642"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617246","reference_id":"1617246","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617246"},{"reference_url":"https://access.redhat.com/errata/RHSA-2004:350","reference_id":"RHSA-2004:350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2004:350"},{"reference_url":"https://access.redhat.com/errata/RHSA-2004:448","reference_id":"RHSA-2004:448","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2004:448"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926405?format=json","purl":"pkg:deb/debian/krb5@1.3.4-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.3.4-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2004-0642"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c3jj-4wf4-tfex"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89768?format=json","vulnerability_id":"VCID-c3nq-gtuy-pydx","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0059.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0059.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2003-0059","reference_id":"","reference_type":"","scores":[{"value":"0.03221","scoring_system":"epss","scoring_elements":"0.86998","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03221","scoring_system":"epss","scoring_elements":"0.87009","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03221","scoring_system":"epss","scoring_elements":"0.87027","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03221","scoring_system":"epss","scoring_elements":"0.8702","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03221","scoring_system":"epss","scoring_elements":"0.8704","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03221","scoring_system":"epss","scoring_elements":"0.87048","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03221","scoring_system":"epss","scoring_elements":"0.87061","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03221","scoring_system":"epss","scoring_elements":"0.87056","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03221","scoring_system":"epss","scoring_elements":"0.87051","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03221","scoring_system":"epss","scoring_elements":"0.87067","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03221","scoring_system":"epss","scoring_elements":"0.87071","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03221","scoring_system":"epss","scoring_elements":"0.87086","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03221","scoring_system":"epss","scoring_elements":"0.87092","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03221","scoring_system":"epss","scoring_elements":"0.87094","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2003-0059"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0059","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0059"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1616946","reference_id":"1616946","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1616946"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:051","reference_id":"RHSA-2003:051","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:051"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:052","reference_id":"RHSA-2003:052","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:052"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:168","reference_id":"RHSA-2003:168","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:168"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926402?format=json","purl":"pkg:deb/debian/krb5@1.2.5-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.2.5-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2003-0059"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c3nq-gtuy-pydx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85460?format=json","vulnerability_id":"VCID-caxe-5ejt-ffgy","summary":"krb5: IAKERB context export/import","references":[{"reference_url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=8273","reference_id":"","reference_type":"","scores":[],"url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=8273"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-11/msg00116.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-11/msg00116.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-12/msg00124.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-12/msg00124.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2698.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2698.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2698","reference_id":"","reference_type":"","scores":[{"value":"0.00867","scoring_system":"epss","scoring_elements":"0.7522","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00867","scoring_system":"epss","scoring_elements":"0.75098","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00867","scoring_system":"epss","scoring_elements":"0.751","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00867","scoring_system":"epss","scoring_elements":"0.75129","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00867","scoring_system":"epss","scoring_elements":"0.75106","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00867","scoring_system":"epss","scoring_elements":"0.75141","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00867","scoring_system":"epss","scoring_elements":"0.75153","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00867","scoring_system":"epss","scoring_elements":"0.75174","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00867","scoring_system":"epss","scoring_elements":"0.75178","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00867","scoring_system":"epss","scoring_elements":"0.75185","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00867","scoring_system":"epss","scoring_elements":"0.75213","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00867","scoring_system":"epss","scoring_elements":"0.75216","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2698"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2698","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2698"},{"reference_url":"https://github.com/krb5/krb5/commit/3db8dfec1ef50ddd78d6ba9503185995876a39fd","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/krb5/krb5/commit/3db8dfec1ef50ddd78d6ba9503185995876a39fd"},{"reference_url":"http://www.ubuntu.com/usn/USN-2810-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2810-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1278951","reference_id":"1278951","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1278951"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.14:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-2698","reference_id":"CVE-2015-2698","reference_type":"","scores":[{"value":"8.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-2698"},{"reference_url":"https://usn.ubuntu.com/2810-1/","reference_id":"USN-2810-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2810-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926451?format=json","purl":"pkg:deb/debian/krb5@1.13.2%2Bdfsg-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.13.2%252Bdfsg-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2015-2698"],"risk_score":3.9,"exploitability":"0.5","weighted_severity":"7.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-caxe-5ejt-ffgy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89717?format=json","vulnerability_id":"VCID-cmnr-xr99-5fh2","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0072.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0072.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2003-0072","reference_id":"","reference_type":"","scores":[{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79292","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79299","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79323","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79309","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79335","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79344","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79368","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79352","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79342","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79369","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79364","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79366","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79399","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79404","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.7942","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2003-0072"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0072","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0072"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1616953","reference_id":"1616953","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1616953"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:051","reference_id":"RHSA-2003:051","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:051"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:052","reference_id":"RHSA-2003:052","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:052"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:168","reference_id":"RHSA-2003:168","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:168"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926404?format=json","purl":"pkg:deb/debian/krb5@1.2.7-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.2.7-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2003-0072"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cmnr-xr99-5fh2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57846?format=json","vulnerability_id":"VCID-d1a1-yfu1-kuaz","summary":"security update","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0345.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0345.html"},{"reference_url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=7949","reference_id":"","reference_type":"","scores":[],"url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=7949"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0439.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-0439.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4342.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4342.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-4342","reference_id":"","reference_type":"","scores":[{"value":"0.08139","scoring_system":"epss","scoring_elements":"0.92184","published_at":"2026-04-29T12:55:00Z"},{"value":"0.08139","scoring_system":"epss","scoring_elements":"0.92186","published_at":"2026-04-26T12:55:00Z"},{"value":"0.08139","scoring_system":"epss","scoring_elements":"0.92138","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08139","scoring_system":"epss","scoring_elements":"0.92145","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08139","scoring_system":"epss","scoring_elements":"0.92151","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08139","scoring_system":"epss","scoring_elements":"0.92155","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08139","scoring_system":"epss","scoring_elements":"0.92166","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08139","scoring_system":"epss","scoring_elements":"0.92169","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08139","scoring_system":"epss","scoring_elements":"0.92174","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08139","scoring_system":"epss","scoring_elements":"0.9217","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08139","scoring_system":"epss","scoring_elements":"0.9218","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08139","scoring_system":"epss","scoring_elements":"0.92182","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-4342"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4342","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4342"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4343","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4343"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4344","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4344"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345"},{"reference_url":"http://secunia.com/advisories/59102","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59102"},{"reference_url":"http://secunia.com/advisories/60082","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60082"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/94903","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/94903"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/krb5/krb5/commit/e6ae703ae597d798e310368d52b8f38ee11c6a73","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/krb5/krb5/commit/e6ae703ae597d798e310368d52b8f38ee11c6a73"},{"reference_url":"http://www.debian.org/security/2014/dsa-3000","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3000"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:165","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:165"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"},{"reference_url":"http://www.securityfocus.com/bid/68908","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/68908"},{"reference_url":"http://www.securitytracker.com/id/1030706","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030706"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1120581","reference_id":"1120581","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1120581"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=753625","reference_id":"753625","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=753625"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.10.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos:5-1.10.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.10.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.10.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos:5-1.10.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.10.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.10.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos:5-1.10.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.10.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.8:alpha1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos:5-1.8:alpha1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.8:alpha1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.9.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.9.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-4342","reference_id":"CVE-2014-4342","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-4342"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1389","reference_id":"RHSA-2014:1389","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1389"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0439","reference_id":"RHSA-2015:0439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0439"},{"reference_url":"https://usn.ubuntu.com/2310-1/","reference_id":"USN-2310-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2310-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926442?format=json","purl":"pkg:deb/debian/krb5@1.12.1%2Bdfsg-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2014-4342"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d1a1-yfu1-kuaz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86783?format=json","vulnerability_id":"VCID-dj1x-1chn-bbhz","summary":"krb5: PKINIT null pointer deref leads to DoS  (pkinit_check_kdc_pkid())","references":[{"reference_url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=7570","reference_id":"","reference_type":"","scores":[],"url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=7570"},{"reference_url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=7577","reference_id":"","reference_type":"","scores":[],"url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=7577"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-03/msg00090.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-03/msg00090.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1415.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1415.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1415","reference_id":"","reference_type":"","scores":[{"value":"0.01588","scoring_system":"epss","scoring_elements":"0.817","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01588","scoring_system":"epss","scoring_elements":"0.81557","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01588","scoring_system":"epss","scoring_elements":"0.81569","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01588","scoring_system":"epss","scoring_elements":"0.8159","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01588","scoring_system":"epss","scoring_elements":"0.81588","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01588","scoring_system":"epss","scoring_elements":"0.81616","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01588","scoring_system":"epss","scoring_elements":"0.81621","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01588","scoring_system":"epss","scoring_elements":"0.81641","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01588","scoring_system":"epss","scoring_elements":"0.81628","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01588","scoring_system":"epss","scoring_elements":"0.81659","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01588","scoring_system":"epss","scoring_elements":"0.81662","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01588","scoring_system":"epss","scoring_elements":"0.81686","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01588","scoring_system":"epss","scoring_elements":"0.81695","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1415"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1415","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1415"},{"reference_url":"http://secunia.com/advisories/55040","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/55040"},{"reference_url":"https://github.com/krb5/krb5/commit/f249555301940c6df3a2cdda13b56b5674eebc2e","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/krb5/krb5/commit/f249555301940c6df3a2cdda13b56b5674eebc2e"},{"reference_url":"http://web.mit.edu/kerberos/www/krb5-1.10/","reference_id":"","reference_type":"","scores":[],"url":"http://web.mit.edu/kerberos/www/krb5-1.10/"},{"reference_url":"http://web.mit.edu/kerberos/www/krb5-1.11/","reference_id":"","reference_type":"","scores":[],"url":"http://web.mit.edu/kerberos/www/krb5-1.11/"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:157","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:157"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=914749","reference_id":"914749","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=914749"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1415","reference_id":"CVE-2013-1415","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1415"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0656","reference_id":"RHSA-2013:0656","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0656"},{"reference_url":"https://usn.ubuntu.com/2310-1/","reference_id":"USN-2310-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2310-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926439?format=json","purl":"pkg:deb/debian/krb5@1.10.1%2Bdfsg-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2013-1415"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dj1x-1chn-bbhz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48777?format=json","vulnerability_id":"VCID-dq1q-jbpx-8fhb","summary":"Multiple vulnerabilities in MIT Kerberos 5 might allow remote\n    unauthenticated users to execute arbitrary code with root privileges.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0847.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0847.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0847","reference_id":"","reference_type":"","scores":[{"value":"0.20287","scoring_system":"epss","scoring_elements":"0.95482","published_at":"2026-04-01T12:55:00Z"},{"value":"0.20287","scoring_system":"epss","scoring_elements":"0.95491","published_at":"2026-04-02T12:55:00Z"},{"value":"0.20287","scoring_system":"epss","scoring_elements":"0.95497","published_at":"2026-04-04T12:55:00Z"},{"value":"0.20287","scoring_system":"epss","scoring_elements":"0.95502","published_at":"2026-04-07T12:55:00Z"},{"value":"0.20287","scoring_system":"epss","scoring_elements":"0.95508","published_at":"2026-04-08T12:55:00Z"},{"value":"0.20287","scoring_system":"epss","scoring_elements":"0.95511","published_at":"2026-04-09T12:55:00Z"},{"value":"0.20287","scoring_system":"epss","scoring_elements":"0.95515","published_at":"2026-04-11T12:55:00Z"},{"value":"0.20287","scoring_system":"epss","scoring_elements":"0.95517","published_at":"2026-04-12T12:55:00Z"},{"value":"0.20287","scoring_system":"epss","scoring_elements":"0.95518","published_at":"2026-04-13T12:55:00Z"},{"value":"0.20287","scoring_system":"epss","scoring_elements":"0.95526","published_at":"2026-04-16T12:55:00Z"},{"value":"0.20287","scoring_system":"epss","scoring_elements":"0.95531","published_at":"2026-04-18T12:55:00Z"},{"value":"0.20287","scoring_system":"epss","scoring_elements":"0.95533","published_at":"2026-04-21T12:55:00Z"},{"value":"0.20287","scoring_system":"epss","scoring_elements":"0.95534","published_at":"2026-04-24T12:55:00Z"},{"value":"0.20287","scoring_system":"epss","scoring_elements":"0.95535","published_at":"2026-04-26T12:55:00Z"},{"value":"0.20287","scoring_system":"epss","scoring_elements":"0.95536","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0847"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0847","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0847"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=491034","reference_id":"491034","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=491034"},{"reference_url":"https://security.gentoo.org/glsa/200904-09","reference_id":"GLSA-200904-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200904-09"},{"reference_url":"https://usn.ubuntu.com/755-1/","reference_id":"USN-755-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/755-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926419?format=json","purl":"pkg:deb/debian/krb5@1.6.dfsg.4~beta1-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.6.dfsg.4~beta1-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2009-0847"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dq1q-jbpx-8fhb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62444?format=json","vulnerability_id":"VCID-dv1m-kz1r-8udu","summary":"Multiple vulnerabilities have been found in MIT Kerberos 5, the\n    most severe of which may allow remote execution of arbitrary code.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056413.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056413.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056573.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056573.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056579.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056579.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"},{"reference_url":"http://osvdb.org/71183","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/71183"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0284.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0284.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0284","reference_id":"","reference_type":"","scores":[{"value":"0.2264","scoring_system":"epss","scoring_elements":"0.95876","published_at":"2026-04-29T12:55:00Z"},{"value":"0.2264","scoring_system":"epss","scoring_elements":"0.95819","published_at":"2026-04-01T12:55:00Z"},{"value":"0.2264","scoring_system":"epss","scoring_elements":"0.95827","published_at":"2026-04-02T12:55:00Z"},{"value":"0.2264","scoring_system":"epss","scoring_elements":"0.95836","published_at":"2026-04-04T12:55:00Z"},{"value":"0.2264","scoring_system":"epss","scoring_elements":"0.95838","published_at":"2026-04-07T12:55:00Z"},{"value":"0.2264","scoring_system":"epss","scoring_elements":"0.95847","published_at":"2026-04-08T12:55:00Z"},{"value":"0.2264","scoring_system":"epss","scoring_elements":"0.9585","published_at":"2026-04-09T12:55:00Z"},{"value":"0.2264","scoring_system":"epss","scoring_elements":"0.95853","published_at":"2026-04-12T12:55:00Z"},{"value":"0.2264","scoring_system":"epss","scoring_elements":"0.95854","published_at":"2026-04-13T12:55:00Z"},{"value":"0.2264","scoring_system":"epss","scoring_elements":"0.95866","published_at":"2026-04-16T12:55:00Z"},{"value":"0.2264","scoring_system":"epss","scoring_elements":"0.95871","published_at":"2026-04-18T12:55:00Z"},{"value":"0.2264","scoring_system":"epss","scoring_elements":"0.95874","published_at":"2026-04-21T12:55:00Z"},{"value":"0.2264","scoring_system":"epss","scoring_elements":"0.95875","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0284"},{"reference_url":"http://secunia.com/advisories/43700","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43700"},{"reference_url":"http://secunia.com/advisories/43760","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43760"},{"reference_url":"http://secunia.com/advisories/43783","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43783"},{"reference_url":"http://secunia.com/advisories/43881","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43881"},{"reference_url":"http://securitytracker.com/id?1025216","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1025216"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/66101","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/66101"},{"reference_url":"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-003.txt","reference_id":"","reference_type":"","scores":[],"url":"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-003.txt"},{"reference_url":"http://www.kb.cert.org/vuls/id/943220","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/943220"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:048","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:048"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0356.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0356.html"},{"reference_url":"http://www.securityfocus.com/archive/1/517029/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/517029/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/46881","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/46881"},{"reference_url":"http://www.ubuntu.com/usn/USN-1088-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1088-1"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0672","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0672"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0673","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0673"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0680","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0680"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0722","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0722"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0763","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0763"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=618517","reference_id":"618517","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=618517"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=674325","reference_id":"674325","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=674325"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-0284","reference_id":"CVE-2011-0284","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-0284"},{"reference_url":"https://security.gentoo.org/glsa/201201-13","reference_id":"GLSA-201201-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0356","reference_id":"RHSA-2011:0356","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0356"},{"reference_url":"https://usn.ubuntu.com/1088-1/","reference_id":"USN-1088-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1088-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926430?format=json","purl":"pkg:deb/debian/krb5@1.8.3%2Bdfsg-6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.8.3%252Bdfsg-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2011-0284"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dv1m-kz1r-8udu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86046?format=json","vulnerability_id":"VCID-dzr3-ncxx-jkck","summary":"krb5: NULL pointer dereference when using keyless entries","references":[{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-03/msg00061.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-03/msg00061.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5354.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5354.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-5354","reference_id":"","reference_type":"","scores":[{"value":"0.0054","scoring_system":"epss","scoring_elements":"0.67692","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0054","scoring_system":"epss","scoring_elements":"0.67557","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0054","scoring_system":"epss","scoring_elements":"0.67593","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0054","scoring_system":"epss","scoring_elements":"0.67614","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0054","scoring_system":"epss","scoring_elements":"0.67645","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0054","scoring_system":"epss","scoring_elements":"0.67659","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0054","scoring_system":"epss","scoring_elements":"0.67682","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0054","scoring_system":"epss","scoring_elements":"0.67666","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0054","scoring_system":"epss","scoring_elements":"0.67634","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0054","scoring_system":"epss","scoring_elements":"0.67668","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0054","scoring_system":"epss","scoring_elements":"0.6768","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0054","scoring_system":"epss","scoring_elements":"0.67679","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0054","scoring_system":"epss","scoring_elements":"0.6769","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-5354"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5354","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5354"},{"reference_url":"https://github.com/krb5/krb5/commit/04038bf3633c4b909b5ded3072dc88c8c419bf16","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/krb5/krb5/commit/04038bf3633c4b909b5ded3072dc88c8c419bf16"},{"reference_url":"http://www.securityfocus.com/bid/71680","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71680"},{"reference_url":"http://www.securitytracker.com/id/1031376","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1031376"},{"reference_url":"http://www.ubuntu.com/usn/USN-2498-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2498-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1174546","reference_id":"1174546","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1174546"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773228","reference_id":"773228","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773228"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5_1.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos:5_1.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5_1.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-5354","reference_id":"CVE-2014-5354","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-5354"},{"reference_url":"https://usn.ubuntu.com/2498-1/","reference_id":"USN-2498-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2498-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926447?format=json","purl":"pkg:deb/debian/krb5@1.12.1%2Bdfsg-16?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-16%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2014-5354"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dzr3-ncxx-jkck"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62445?format=json","vulnerability_id":"VCID-e81a-vujj-yfcs","summary":"Multiple vulnerabilities have been found in MIT Kerberos 5, the\n    most severe of which may allow remote execution of arbitrary code.","references":[{"reference_url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=621726","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=621726"},{"reference_url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=6899","reference_id":"","reference_type":"","scores":[],"url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=6899"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058181.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058181.html"},{"reference_url":"http://osvdb.org/71789","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/71789"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0285.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0285.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0285","reference_id":"","reference_type":"","scores":[{"value":"0.54024","scoring_system":"epss","scoring_elements":"0.98016","published_at":"2026-04-24T12:55:00Z"},{"value":"0.54024","scoring_system":"epss","scoring_elements":"0.97994","published_at":"2026-04-01T12:55:00Z"},{"value":"0.54024","scoring_system":"epss","scoring_elements":"0.97998","published_at":"2026-04-02T12:55:00Z"},{"value":"0.54024","scoring_system":"epss","scoring_elements":"0.98","published_at":"2026-04-04T12:55:00Z"},{"value":"0.54024","scoring_system":"epss","scoring_elements":"0.98002","published_at":"2026-04-07T12:55:00Z"},{"value":"0.54024","scoring_system":"epss","scoring_elements":"0.98007","published_at":"2026-04-08T12:55:00Z"},{"value":"0.54024","scoring_system":"epss","scoring_elements":"0.98008","published_at":"2026-04-09T12:55:00Z"},{"value":"0.54024","scoring_system":"epss","scoring_elements":"0.98012","published_at":"2026-04-11T12:55:00Z"},{"value":"0.54024","scoring_system":"epss","scoring_elements":"0.98013","published_at":"2026-04-12T12:55:00Z"},{"value":"0.54024","scoring_system":"epss","scoring_elements":"0.98014","published_at":"2026-04-13T12:55:00Z"},{"value":"0.54024","scoring_system":"epss","scoring_elements":"0.9802","published_at":"2026-04-29T12:55:00Z"},{"value":"0.54024","scoring_system":"epss","scoring_elements":"0.98017","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0285"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0285","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0285"},{"reference_url":"http://secunia.com/advisories/44125","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/44125"},{"reference_url":"http://secunia.com/advisories/44181","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/44181"},{"reference_url":"http://secunia.com/advisories/44196","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/44196"},{"reference_url":"http://securityreason.com/securityalert/8200","reference_id":"","reference_type":"","scores":[],"url":"http://securityreason.com/securityalert/8200"},{"reference_url":"https://hermes.opensuse.org/messages/8086843","reference_id":"","reference_type":"","scores":[],"url":"https://hermes.opensuse.org/messages/8086843"},{"reference_url":"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-004.txt","reference_id":"","reference_type":"","scores":[],"url":"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-004.txt"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:077","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:077"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0447.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0447.html"},{"reference_url":"http://www.securityfocus.com/archive/1/517484/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/517484/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/47310","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/47310"},{"reference_url":"http://www.securitytracker.com/id?1025320","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1025320"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0936","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0936"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0986","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0986"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0997","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0997"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622681","reference_id":"622681","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622681"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=696334","reference_id":"696334","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=696334"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-0285","reference_id":"CVE-2011-0285","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-0285"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/35606.txt","reference_id":"CVE-2011-0285;OSVDB-71789","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/35606.txt"},{"reference_url":"https://www.securityfocus.com/bid/47310/info","reference_id":"CVE-2011-0285;OSVDB-71789","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/47310/info"},{"reference_url":"https://security.gentoo.org/glsa/201201-13","reference_id":"GLSA-201201-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0447","reference_id":"RHSA-2011:0447","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0447"},{"reference_url":"https://usn.ubuntu.com/1116-1/","reference_id":"USN-1116-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1116-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926431?format=json","purl":"pkg:deb/debian/krb5@1.9.1%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.9.1%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2011-0285"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e81a-vujj-yfcs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77501?format=json","vulnerability_id":"VCID-e827-j3gv-hkau","summary":"krb5: Memory leak at /krb5/src/kdc/ndr.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-26462.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-26462.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-26462","reference_id":"","reference_type":"","scores":[{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06734","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06648","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06577","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06569","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06726","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06725","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06558","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06595","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06578","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06629","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06672","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06664","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06656","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-26462"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1064965","reference_id":"1064965","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1064965"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2266742","reference_id":"2266742","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2266742"},{"reference_url":"https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_3.md","reference_id":"krb5_detect_3.md","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-25T20:04:17Z/"}],"url":"https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_3.md"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240415-0012/","reference_id":"ntap-20240415-0012","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-25T20:04:17Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240415-0012/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9331","reference_id":"RHSA-2024:9331","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9331"},{"reference_url":"https://usn.ubuntu.com/7314-1/","reference_id":"USN-7314-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7314-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926401?format=json","purl":"pkg:deb/debian/krb5@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926469?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926470?format=json","purl":"pkg:deb/debian/krb5@1.21.3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2024-26462"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e827-j3gv-hkau"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89037?format=json","vulnerability_id":"VCID-ejsk-ytem-9ucw","summary":"security flaw","references":[{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20050703-01-U.asc","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20050703-01-U.asc"},{"reference_url":"http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html"},{"reference_url":"http://marc.info/?l=bugtraq&m=112122123211974&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=112122123211974&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-1175.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-1175.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-1175","reference_id":"","reference_type":"","scores":[{"value":"0.45397","scoring_system":"epss","scoring_elements":"0.97621","published_at":"2026-04-29T12:55:00Z"},{"value":"0.45397","scoring_system":"epss","scoring_elements":"0.97584","published_at":"2026-04-01T12:55:00Z"},{"value":"0.45397","scoring_system":"epss","scoring_elements":"0.9759","published_at":"2026-04-02T12:55:00Z"},{"value":"0.45397","scoring_system":"epss","scoring_elements":"0.97593","published_at":"2026-04-04T12:55:00Z"},{"value":"0.45397","scoring_system":"epss","scoring_elements":"0.97594","published_at":"2026-04-07T12:55:00Z"},{"value":"0.45397","scoring_system":"epss","scoring_elements":"0.976","published_at":"2026-04-08T12:55:00Z"},{"value":"0.45397","scoring_system":"epss","scoring_elements":"0.97602","published_at":"2026-04-09T12:55:00Z"},{"value":"0.45397","scoring_system":"epss","scoring_elements":"0.97605","published_at":"2026-04-11T12:55:00Z"},{"value":"0.45397","scoring_system":"epss","scoring_elements":"0.97607","published_at":"2026-04-12T12:55:00Z"},{"value":"0.45397","scoring_system":"epss","scoring_elements":"0.97608","published_at":"2026-04-13T12:55:00Z"},{"value":"0.45397","scoring_system":"epss","scoring_elements":"0.97616","published_at":"2026-04-24T12:55:00Z"},{"value":"0.45397","scoring_system":"epss","scoring_elements":"0.97617","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-1175"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1175","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1175"},{"reference_url":"http://secunia.com/advisories/16041","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/16041"},{"reference_url":"http://secunia.com/advisories/17135","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17135"},{"reference_url":"http://secunia.com/advisories/17899","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17899"},{"reference_url":"http://secunia.com/advisories/20364","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/20364"},{"reference_url":"http://securitytracker.com/id?1014460","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1014460"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/21328","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/21328"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A736","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A736"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9902","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9902"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-101809-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-101809-1"},{"reference_url":"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-002-kdc.txt","reference_id":"","reference_type":"","scores":[],"url":"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-002-kdc.txt"},{"reference_url":"http://www-1.ibm.com/support/docview.wss?uid=swg1IY85474","reference_id":"","reference_type":"","scores":[],"url":"http://www-1.ibm.com/support/docview.wss?uid=swg1IY85474"},{"reference_url":"http://www.debian.org/security/2005/dsa-757","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-757"},{"reference_url":"http://www.kb.cert.org/vuls/id/885830","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/885830"},{"reference_url":"http://www.novell.com/linux/security/advisories/2005_17_sr.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2005_17_sr.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-562.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-562.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-567.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-567.html"},{"reference_url":"http://www.securityfocus.com/bid/14236","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/14236"},{"reference_url":"http://www.trustix.org/errata/2005/0036","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2005/0036"},{"reference_url":"http://www.turbolinux.com/security/2005/TLSA-2005-78.txt","reference_id":"","reference_type":"","scores":[],"url":"http://www.turbolinux.com/security/2005/TLSA-2005-78.txt"},{"reference_url":"http://www.vupen.com/english/advisories/2005/1066","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2005/1066"},{"reference_url":"http://www.vupen.com/english/advisories/2006/2074","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2006/2074"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617614","reference_id":"1617614","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617614"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=318437","reference_id":"318437","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=318437"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-1175","reference_id":"CVE-2005-1175","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-1175"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:562","reference_id":"RHSA-2005:562","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:562"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:567","reference_id":"RHSA-2005:567","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:567"},{"reference_url":"https://usn.ubuntu.com/224-1/","reference_id":"USN-224-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/224-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926410?format=json","purl":"pkg:deb/debian/krb5@1.3.6-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.3.6-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2005-1175"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ejsk-ytem-9ucw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62431?format=json","vulnerability_id":"VCID-erjs-zb26-eubh","summary":"Multiple vulnerabilities have been found in MIT Kerberos 5, the\n    most severe of which may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0283.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0283.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0283","reference_id":"","reference_type":"","scores":[{"value":"0.03728","scoring_system":"epss","scoring_elements":"0.87934","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03728","scoring_system":"epss","scoring_elements":"0.87944","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03728","scoring_system":"epss","scoring_elements":"0.87958","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03728","scoring_system":"epss","scoring_elements":"0.87962","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03728","scoring_system":"epss","scoring_elements":"0.87982","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03728","scoring_system":"epss","scoring_elements":"0.87989","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03728","scoring_system":"epss","scoring_elements":"0.88","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03728","scoring_system":"epss","scoring_elements":"0.87993","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03728","scoring_system":"epss","scoring_elements":"0.87992","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03728","scoring_system":"epss","scoring_elements":"0.88006","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03728","scoring_system":"epss","scoring_elements":"0.88005","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03728","scoring_system":"epss","scoring_elements":"0.88021","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03728","scoring_system":"epss","scoring_elements":"0.88027","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0283"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=556680","reference_id":"556680","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=556680"},{"reference_url":"https://security.gentoo.org/glsa/201201-13","reference_id":"GLSA-201201-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-13"},{"reference_url":"https://usn.ubuntu.com/916-1/","reference_id":"USN-916-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/916-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926422?format=json","purl":"pkg:deb/debian/krb5@1.8%2Bdfsg~alpha1-7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.8%252Bdfsg~alpha1-7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2010-0283"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-erjs-zb26-eubh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88510?format=json","vulnerability_id":"VCID-es62-aq7d-cue8","summary":"krb5: incorrect handling of high-numbered file descriptors in RPC library","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0948.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0948.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0948","reference_id":"","reference_type":"","scores":[{"value":"0.1596","scoring_system":"epss","scoring_elements":"0.9473","published_at":"2026-04-01T12:55:00Z"},{"value":"0.1596","scoring_system":"epss","scoring_elements":"0.94739","published_at":"2026-04-02T12:55:00Z"},{"value":"0.1596","scoring_system":"epss","scoring_elements":"0.94742","published_at":"2026-04-04T12:55:00Z"},{"value":"0.1596","scoring_system":"epss","scoring_elements":"0.94744","published_at":"2026-04-07T12:55:00Z"},{"value":"0.1596","scoring_system":"epss","scoring_elements":"0.94753","published_at":"2026-04-08T12:55:00Z"},{"value":"0.1596","scoring_system":"epss","scoring_elements":"0.94758","published_at":"2026-04-09T12:55:00Z"},{"value":"0.1596","scoring_system":"epss","scoring_elements":"0.94761","published_at":"2026-04-11T12:55:00Z"},{"value":"0.1596","scoring_system":"epss","scoring_elements":"0.94765","published_at":"2026-04-12T12:55:00Z"},{"value":"0.1596","scoring_system":"epss","scoring_elements":"0.94766","published_at":"2026-04-13T12:55:00Z"},{"value":"0.1596","scoring_system":"epss","scoring_elements":"0.94774","published_at":"2026-04-16T12:55:00Z"},{"value":"0.1596","scoring_system":"epss","scoring_elements":"0.94777","published_at":"2026-04-18T12:55:00Z"},{"value":"0.1596","scoring_system":"epss","scoring_elements":"0.94779","published_at":"2026-04-21T12:55:00Z"},{"value":"0.1596","scoring_system":"epss","scoring_elements":"0.9478","published_at":"2026-04-24T12:55:00Z"},{"value":"0.1596","scoring_system":"epss","scoring_elements":"0.94781","published_at":"2026-04-26T12:55:00Z"},{"value":"0.1596","scoring_system":"epss","scoring_elements":"0.94783","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0948"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0948","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0948"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=435087","reference_id":"435087","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=435087"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0181","reference_id":"RHSA-2008:0181","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0181"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926418?format=json","purl":"pkg:deb/debian/krb5@1.3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2008-0948"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-es62-aq7d-cue8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84022?format=json","vulnerability_id":"VCID-exb4-v6zx-4qcu","summary":"krb5: Authentication bypass by improper validation of certificate EKU and SAN","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7562.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7562.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7562","reference_id":"","reference_type":"","scores":[{"value":"0.00429","scoring_system":"epss","scoring_elements":"0.62385","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00429","scoring_system":"epss","scoring_elements":"0.62546","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00429","scoring_system":"epss","scoring_elements":"0.62534","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00429","scoring_system":"epss","scoring_elements":"0.6255","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00429","scoring_system":"epss","scoring_elements":"0.62444","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00429","scoring_system":"epss","scoring_elements":"0.62474","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00429","scoring_system":"epss","scoring_elements":"0.62441","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00429","scoring_system":"epss","scoring_elements":"0.62492","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00429","scoring_system":"epss","scoring_elements":"0.62508","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00429","scoring_system":"epss","scoring_elements":"0.62527","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00429","scoring_system":"epss","scoring_elements":"0.62516","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00429","scoring_system":"epss","scoring_elements":"0.62494","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00429","scoring_system":"epss","scoring_elements":"0.62536","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00429","scoring_system":"epss","scoring_elements":"0.62542","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00429","scoring_system":"epss","scoring_elements":"0.62524","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7562"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:N/I:C/A:N"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1485510","reference_id":"1485510","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1485510"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0666","reference_id":"RHSA-2018:0666","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0666"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926401?format=json","purl":"pkg:deb/debian/krb5@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2017-7562"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-exb4-v6zx-4qcu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82970?format=json","vulnerability_id":"VCID-fd9s-vn5s-gud6","summary":"krb5: Reachable assertion in the KDC using S4U2Self requests","references":[{"reference_url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763","reference_id":"","reference_type":"","scores":[],"url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20217.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20217.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-20217","reference_id":"","reference_type":"","scores":[{"value":"0.02377","scoring_system":"epss","scoring_elements":"0.85036","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02377","scoring_system":"epss","scoring_elements":"0.84984","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02377","scoring_system":"epss","scoring_elements":"0.85005","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02377","scoring_system":"epss","scoring_elements":"0.85007","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02377","scoring_system":"epss","scoring_elements":"0.85004","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02377","scoring_system":"epss","scoring_elements":"0.85029","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02377","scoring_system":"epss","scoring_elements":"0.85037","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02665","scoring_system":"epss","scoring_elements":"0.85779","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02665","scoring_system":"epss","scoring_elements":"0.8579","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02665","scoring_system":"epss","scoring_elements":"0.85805","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02665","scoring_system":"epss","scoring_elements":"0.85801","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02665","scoring_system":"epss","scoring_elements":"0.85723","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02665","scoring_system":"epss","scoring_elements":"0.85735","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02665","scoring_system":"epss","scoring_elements":"0.85754","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02665","scoring_system":"epss","scoring_elements":"0.8576","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-20217"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190416-0006/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20190416-0006/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1665296","reference_id":"1665296","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1665296"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=917387","reference_id":"917387","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=917387"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20217","reference_id":"CVE-2018-20217","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:N/I:N/A:P"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20217"},{"reference_url":"https://usn.ubuntu.com/5828-1/","reference_id":"USN-5828-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5828-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926458?format=json","purl":"pkg:deb/debian/krb5@1.16.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.16.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2018-20217"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fd9s-vn5s-gud6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62177?format=json","vulnerability_id":"VCID-fg2w-sjkb-ebgb","summary":"security update","references":[{"reference_url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=8341","reference_id":"","reference_type":"","scores":[],"url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=8341"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0493.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0493.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0532.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0532.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8629.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8629.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8629","reference_id":"","reference_type":"","scores":[{"value":"0.0161","scoring_system":"epss","scoring_elements":"0.81835","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0161","scoring_system":"epss","scoring_elements":"0.81821","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0161","scoring_system":"epss","scoring_elements":"0.81831","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0161","scoring_system":"epss","scoring_elements":"0.81692","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0161","scoring_system":"epss","scoring_elements":"0.81702","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0161","scoring_system":"epss","scoring_elements":"0.81725","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0161","scoring_system":"epss","scoring_elements":"0.81723","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0161","scoring_system":"epss","scoring_elements":"0.8175","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0161","scoring_system":"epss","scoring_elements":"0.81754","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0161","scoring_system":"epss","scoring_elements":"0.81773","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0161","scoring_system":"epss","scoring_elements":"0.81761","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0161","scoring_system":"epss","scoring_elements":"0.81756","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0161","scoring_system":"epss","scoring_elements":"0.81793","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0161","scoring_system":"epss","scoring_elements":"0.81794","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0161","scoring_system":"epss","scoring_elements":"0.81797","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8631","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8631"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:P/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/krb5/krb5/commit/df17a1224a3406f57477bcd372c61e04c0e5a5bb","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/krb5/krb5/commit/df17a1224a3406f57477bcd372c61e04c0e5a5bb"},{"reference_url":"http://www.debian.org/security/2016/dsa-3466","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3466"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.securityfocus.com/bid/82801","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/82801"},{"reference_url":"http://www.securitytracker.com/id/1034914","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034914"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1302617","reference_id":"1302617","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1302617"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813296","reference_id":"813296","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813296"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8629","reference_id":"CVE-2015-8629","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:P/I:N/A:N"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0493","reference_id":"RHSA-2016:0493","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0493"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0532","reference_id":"RHSA-2016:0532","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0532"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926452?format=json","purl":"pkg:deb/debian/krb5@1.13.2%2Bdfsg-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.13.2%252Bdfsg-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2015-8629"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fg2w-sjkb-ebgb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47302?format=json","vulnerability_id":"VCID-g1xe-gb5c-vkd8","summary":"Multiple vulnerabilities have been discovered in MIT krb5, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39975.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39975.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-39975","reference_id":"","reference_type":"","scores":[{"value":"0.01226","scoring_system":"epss","scoring_elements":"0.79079","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01226","scoring_system":"epss","scoring_elements":"0.79206","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01226","scoring_system":"epss","scoring_elements":"0.79106","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01226","scoring_system":"epss","scoring_elements":"0.79091","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01226","scoring_system":"epss","scoring_elements":"0.79116","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01226","scoring_system":"epss","scoring_elements":"0.79124","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01226","scoring_system":"epss","scoring_elements":"0.79148","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01226","scoring_system":"epss","scoring_elements":"0.79134","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01226","scoring_system":"epss","scoring_elements":"0.79151","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01226","scoring_system":"epss","scoring_elements":"0.79149","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01226","scoring_system":"epss","scoring_elements":"0.79182","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01226","scoring_system":"epss","scoring_elements":"0.79189","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-39975"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2232682","reference_id":"2232682","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2232682"},{"reference_url":"https://github.com/krb5/krb5/commit/88a1701b423c13991a8064feeb26952d3641d840","reference_id":"88a1701b423c13991a8064feeb26952d3641d840","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-15T05:16:00Z/"}],"url":"https://github.com/krb5/krb5/commit/88a1701b423c13991a8064feeb26952d3641d840"},{"reference_url":"https://web.mit.edu/kerberos/www/advisories/","reference_id":"advisories","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-15T05:16:00Z/"}],"url":"https://web.mit.edu/kerberos/www/advisories/"},{"reference_url":"https://security.gentoo.org/glsa/202405-11","reference_id":"GLSA-202405-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-11"},{"reference_url":"https://github.com/krb5/krb5/compare/krb5-1.21.1-final...krb5-1.21.2-final","reference_id":"krb5-1.21.1-final...krb5-1.21.2-final","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-15T05:16:00Z/"}],"url":"https://github.com/krb5/krb5/compare/krb5-1.21.1-final...krb5-1.21.2-final"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230915-0014/","reference_id":"ntap-20230915-0014","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-15T05:16:00Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230915-0014/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240201-0005/","reference_id":"ntap-20240201-0005","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-15T05:16:00Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240201-0005/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240201-0008/","reference_id":"ntap-20240201-0008","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-15T05:16:00Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240201-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6699","reference_id":"RHSA-2023:6699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6699"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926401?format=json","purl":"pkg:deb/debian/krb5@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2023-39975"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g1xe-gb5c-vkd8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49487?format=json","vulnerability_id":"VCID-h9q8-x3n3-6qdn","summary":"A vulnerability in MIT Kerberos 5 could lead to a Denial of Service\n    condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28196.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28196.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-28196","reference_id":"","reference_type":"","scores":[{"value":"0.01293","scoring_system":"epss","scoring_elements":"0.79756","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01293","scoring_system":"epss","scoring_elements":"0.79742","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01293","scoring_system":"epss","scoring_elements":"0.79624","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01293","scoring_system":"epss","scoring_elements":"0.79696","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01293","scoring_system":"epss","scoring_elements":"0.79675","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01293","scoring_system":"epss","scoring_elements":"0.79631","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01293","scoring_system":"epss","scoring_elements":"0.79653","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01293","scoring_system":"epss","scoring_elements":"0.79639","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01293","scoring_system":"epss","scoring_elements":"0.79668","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01293","scoring_system":"epss","scoring_elements":"0.79735","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01293","scoring_system":"epss","scoring_elements":"0.79705","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01293","scoring_system":"epss","scoring_elements":"0.79702","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01293","scoring_system":"epss","scoring_elements":"0.79701","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01293","scoring_system":"epss","scoring_elements":"0.79673","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01293","scoring_system":"epss","scoring_elements":"0.7968","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-28196"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28196","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28196"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1901041","reference_id":"1901041","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1901041"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/45KKOZQWIIIW5C45PJVGQ32AXBSYNBE7/","reference_id":"45KKOZQWIIIW5C45PJVGQ32AXBSYNBE7","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T18:14:50Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/45KKOZQWIIIW5C45PJVGQ32AXBSYNBE7/"},{"reference_url":"https://github.com/krb5/krb5/commit/57415dda6cf04e73ffc3723be518eddfae599bfd","reference_id":"57415dda6cf04e73ffc3723be518eddfae599bfd","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T18:14:50Z/"}],"url":"https://github.com/krb5/krb5/commit/57415dda6cf04e73ffc3723be518eddfae599bfd"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/73IGOG6CZAVMVNS4GGRMOLOZ7B6QVA7F/","reference_id":"73IGOG6CZAVMVNS4GGRMOLOZ7B6QVA7F","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T18:14:50Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/73IGOG6CZAVMVNS4GGRMOLOZ7B6QVA7F/"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973880","reference_id":"973880","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973880"},{"reference_url":"https://www.debian.org/security/2020/dsa-4795","reference_id":"dsa-4795","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T18:14:50Z/"}],"url":"https://www.debian.org/security/2020/dsa-4795"},{"reference_url":"https://security.gentoo.org/glsa/202011-17","reference_id":"GLSA-202011-17","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T18:14:50Z/"}],"url":"https://security.gentoo.org/glsa/202011-17"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPH2V3WSQTELROZK3GFCPQDOFLKIZ6H5/","reference_id":"KPH2V3WSQTELROZK3GFCPQDOFLKIZ6H5","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T18:14:50Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPH2V3WSQTELROZK3GFCPQDOFLKIZ6H5/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/11/msg00011.html","reference_id":"msg00011.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T18:14:50Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/11/msg00011.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20201202-0001/","reference_id":"ntap-20201202-0001","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T18:14:50Z/"}],"url":"https://security.netapp.com/advisory/ntap-20201202-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1593","reference_id":"RHSA-2021:1593","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1593"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2239","reference_id":"RHSA-2021:2239","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2239"},{"reference_url":"https://usn.ubuntu.com/4635-1/","reference_id":"USN-4635-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4635-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926460?format=json","purl":"pkg:deb/debian/krb5@1.18.3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2020-28196"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h9q8-x3n3-6qdn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88598?format=json","vulnerability_id":"VCID-hg4a-pcem-pqf9","summary":"krb5: double free in kdb lib","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5972.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5972.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5972","reference_id":"","reference_type":"","scores":[{"value":"0.01923","scoring_system":"epss","scoring_elements":"0.83291","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01923","scoring_system":"epss","scoring_elements":"0.83307","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01923","scoring_system":"epss","scoring_elements":"0.83323","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01923","scoring_system":"epss","scoring_elements":"0.83347","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01923","scoring_system":"epss","scoring_elements":"0.83356","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01923","scoring_system":"epss","scoring_elements":"0.83372","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01923","scoring_system":"epss","scoring_elements":"0.83366","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01923","scoring_system":"epss","scoring_elements":"0.83361","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01923","scoring_system":"epss","scoring_elements":"0.83397","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01923","scoring_system":"epss","scoring_elements":"0.83398","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01923","scoring_system":"epss","scoring_elements":"0.83399","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01923","scoring_system":"epss","scoring_elements":"0.83421","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01923","scoring_system":"epss","scoring_elements":"0.83429","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01923","scoring_system":"epss","scoring_elements":"0.83431","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5972"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5972","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5972"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=415361","reference_id":"415361","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=415361"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454974","reference_id":"454974","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454974"},{"reference_url":"https://usn.ubuntu.com/924-1/","reference_id":"USN-924-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/924-1/"},{"reference_url":"https://usn.ubuntu.com/940-1/","reference_id":"USN-940-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/940-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926416?format=json","purl":"pkg:deb/debian/krb5@1.6.dfsg.4~beta1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.6.dfsg.4~beta1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2007-5972"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hg4a-pcem-pqf9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48774?format=json","vulnerability_id":"VCID-hryp-mt7d-kygt","summary":"Multiple vulnerabilities in MIT Kerberos 5 might allow remote\n    unauthenticated users to execute arbitrary code with root privileges.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0844.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0844.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0844","reference_id":"","reference_type":"","scores":[{"value":"0.03433","scoring_system":"epss","scoring_elements":"0.8742","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03433","scoring_system":"epss","scoring_elements":"0.8743","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03433","scoring_system":"epss","scoring_elements":"0.87444","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03433","scoring_system":"epss","scoring_elements":"0.87446","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03433","scoring_system":"epss","scoring_elements":"0.87465","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03433","scoring_system":"epss","scoring_elements":"0.87472","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03433","scoring_system":"epss","scoring_elements":"0.87484","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03433","scoring_system":"epss","scoring_elements":"0.87479","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03433","scoring_system":"epss","scoring_elements":"0.87476","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03433","scoring_system":"epss","scoring_elements":"0.8749","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03433","scoring_system":"epss","scoring_elements":"0.87492","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03433","scoring_system":"epss","scoring_elements":"0.87506","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03433","scoring_system":"epss","scoring_elements":"0.87513","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03433","scoring_system":"epss","scoring_elements":"0.87512","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0844"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0844","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0844"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=491033","reference_id":"491033","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=491033"},{"reference_url":"https://security.gentoo.org/glsa/200904-09","reference_id":"GLSA-200904-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200904-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0408","reference_id":"RHSA-2009:0408","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0408"},{"reference_url":"https://usn.ubuntu.com/755-1/","reference_id":"USN-755-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/755-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926419?format=json","purl":"pkg:deb/debian/krb5@1.6.dfsg.4~beta1-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.6.dfsg.4~beta1-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2009-0844"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hryp-mt7d-kygt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85694?format=json","vulnerability_id":"VCID-j6tv-fz95-3kb8","summary":"krb5: issues in OTP and PKINIT kdcpreauth modules leading to requires_preauth bypass","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2694.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2694.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2694","reference_id":"","reference_type":"","scores":[{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.75463","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.75465","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.75497","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.75477","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.75519","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.75529","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.75548","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.75527","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.75517","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.7556","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.75566","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.75552","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.7559","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.75595","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.75599","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2694"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2694","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2694"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1216133","reference_id":"1216133","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1216133"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783557","reference_id":"783557","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783557"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2154","reference_id":"RHSA-2015:2154","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2154"},{"reference_url":"https://usn.ubuntu.com/2810-1/","reference_id":"USN-2810-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2810-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926449?format=json","purl":"pkg:deb/debian/krb5@1.12.1%2Bdfsg-20?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-20%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2015-2694"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j6tv-fz95-3kb8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62432?format=json","vulnerability_id":"VCID-j9uk-e9sc-y3gp","summary":"Multiple vulnerabilities have been found in MIT Kerberos 5, the\n    most severe of which may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0629.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0629.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0629","reference_id":"","reference_type":"","scores":[{"value":"0.02284","scoring_system":"epss","scoring_elements":"0.84618","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02284","scoring_system":"epss","scoring_elements":"0.84632","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02284","scoring_system":"epss","scoring_elements":"0.84652","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02284","scoring_system":"epss","scoring_elements":"0.84654","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02284","scoring_system":"epss","scoring_elements":"0.84675","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02284","scoring_system":"epss","scoring_elements":"0.84682","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02284","scoring_system":"epss","scoring_elements":"0.847","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02284","scoring_system":"epss","scoring_elements":"0.84696","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02284","scoring_system":"epss","scoring_elements":"0.8469","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02284","scoring_system":"epss","scoring_elements":"0.84711","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02284","scoring_system":"epss","scoring_elements":"0.84712","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02284","scoring_system":"epss","scoring_elements":"0.84713","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02284","scoring_system":"epss","scoring_elements":"0.8474","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02284","scoring_system":"epss","scoring_elements":"0.8475","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02284","scoring_system":"epss","scoring_elements":"0.84749","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0629"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=576011","reference_id":"576011","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=576011"},{"reference_url":"https://security.gentoo.org/glsa/201201-13","reference_id":"GLSA-201201-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0343","reference_id":"RHSA-2010:0343","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0343"},{"reference_url":"https://usn.ubuntu.com/924-1/","reference_id":"USN-924-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/924-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926424?format=json","purl":"pkg:deb/debian/krb5@1.7%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.7%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2010-0629"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j9uk-e9sc-y3gp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57885?format=json","vulnerability_id":"VCID-jask-8b2h-p3h8","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9423.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9423.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9423","reference_id":"","reference_type":"","scores":[{"value":"0.01537","scoring_system":"epss","scoring_elements":"0.8142","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01537","scoring_system":"epss","scoring_elements":"0.81283","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01537","scoring_system":"epss","scoring_elements":"0.81292","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01537","scoring_system":"epss","scoring_elements":"0.81314","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01537","scoring_system":"epss","scoring_elements":"0.81313","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01537","scoring_system":"epss","scoring_elements":"0.81342","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01537","scoring_system":"epss","scoring_elements":"0.81347","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01537","scoring_system":"epss","scoring_elements":"0.81368","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01537","scoring_system":"epss","scoring_elements":"0.81353","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01537","scoring_system":"epss","scoring_elements":"0.81345","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01537","scoring_system":"epss","scoring_elements":"0.81383","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01537","scoring_system":"epss","scoring_elements":"0.81385","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01537","scoring_system":"epss","scoring_elements":"0.81386","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01537","scoring_system":"epss","scoring_elements":"0.81408","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01537","scoring_system":"epss","scoring_elements":"0.81415","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9423"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5352","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5352"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9421"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9422","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9422"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9423","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9423"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1179863","reference_id":"1179863","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1179863"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0439","reference_id":"RHSA-2015:0439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0439"},{"reference_url":"https://usn.ubuntu.com/2498-1/","reference_id":"USN-2498-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2498-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926446?format=json","purl":"pkg:deb/debian/krb5@1.12.1%2Bdfsg-17?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-17%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2014-9423"],"risk_score":1.2,"exploitability":"0.5","weighted_severity":"2.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jask-8b2h-p3h8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62434?format=json","vulnerability_id":"VCID-jfb1-3vg4-vbap","summary":"Multiple vulnerabilities have been found in MIT Kerberos 5, the\n    most severe of which may allow remote execution of arbitrary code.","references":[{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02257427","reference_id":"","reference_type":"","scores":[],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02257427"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041615.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041615.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041645.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041645.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041654.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041654.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00010.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00010.html"},{"reference_url":"http://marc.info/?l=bugtraq&m=134254866602253&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=134254866602253&w=2"},{"reference_url":"http://osvdb.org/64744","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/64744"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1321.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1321.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1321","reference_id":"","reference_type":"","scores":[{"value":"0.01857","scoring_system":"epss","scoring_elements":"0.83111","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01857","scoring_system":"epss","scoring_elements":"0.82969","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01857","scoring_system":"epss","scoring_elements":"0.82985","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01857","scoring_system":"epss","scoring_elements":"0.82998","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01857","scoring_system":"epss","scoring_elements":"0.82995","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01857","scoring_system":"epss","scoring_elements":"0.8302","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01857","scoring_system":"epss","scoring_elements":"0.83027","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01857","scoring_system":"epss","scoring_elements":"0.83043","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01857","scoring_system":"epss","scoring_elements":"0.83036","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01857","scoring_system":"epss","scoring_elements":"0.83032","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01857","scoring_system":"epss","scoring_elements":"0.8307","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01857","scoring_system":"epss","scoring_elements":"0.83073","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01857","scoring_system":"epss","scoring_elements":"0.83096","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01857","scoring_system":"epss","scoring_elements":"0.83103","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1321"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1321","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1321"},{"reference_url":"http://secunia.com/advisories/39762","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/39762"},{"reference_url":"http://secunia.com/advisories/39784","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/39784"},{"reference_url":"http://secunia.com/advisories/39799","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/39799"},{"reference_url":"http://secunia.com/advisories/39818","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/39818"},{"reference_url":"http://secunia.com/advisories/39849","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/39849"},{"reference_url":"http://secunia.com/advisories/40346","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40346"},{"reference_url":"http://secunia.com/advisories/40685","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40685"},{"reference_url":"http://secunia.com/advisories/41967","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/41967"},{"reference_url":"http://secunia.com/advisories/42432","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42432"},{"reference_url":"http://secunia.com/advisories/42974","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42974"},{"reference_url":"http://secunia.com/advisories/43335","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43335"},{"reference_url":"http://secunia.com/advisories/44954","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/44954"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11604","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11604"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7198","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7198"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7450","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7450"},{"reference_url":"http://support.avaya.com/css/P8/documents/100114315","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/css/P8/documents/100114315"},{"reference_url":"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-005.txt","reference_id":"","reference_type":"","scores":[],"url":"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-005.txt"},{"reference_url":"http://www.debian.org/security/2010/dsa-2052","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2010/dsa-2052"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:100","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:100"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0423.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0423.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0770.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0770.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0807.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0807.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0873.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0873.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0935.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0935.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0987.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0987.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0152.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0152.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0880.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0880.html"},{"reference_url":"http://www.securityfocus.com/archive/1/511331/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/511331/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/516397/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/516397/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/40235","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/40235"},{"reference_url":"http://www.ubuntu.com/usn/USN-940-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-940-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-940-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-940-2"},{"reference_url":"http://www.us-cert.gov/cas/techalerts/TA10-287A.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.us-cert.gov/cas/techalerts/TA10-287A.html"},{"reference_url":"http://www.us-cert.gov/cas/techalerts/TA11-201A.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.us-cert.gov/cas/techalerts/TA11-201A.html"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2011-0003.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2011-0003.html"},{"reference_url":"http://www.vupen.com/english/advisories/2010/1177","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/1177"},{"reference_url":"http://www.vupen.com/english/advisories/2010/1192","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/1192"},{"reference_url":"http://www.vupen.com/english/advisories/2010/1193","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/1193"},{"reference_url":"http://www.vupen.com/english/advisories/2010/1196","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/1196"},{"reference_url":"http://www.vupen.com/english/advisories/2010/1222","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/1222"},{"reference_url":"http://www.vupen.com/english/advisories/2010/1574","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/1574"},{"reference_url":"http://www.vupen.com/english/advisories/2010/1882","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/1882"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3112","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3112"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0134","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0134"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=582261","reference_id":"582261","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=582261"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=582466","reference_id":"582466","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=582466"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:database_server:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:database_server:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:database_server:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-1321","reference_id":"CVE-2010-1321","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-1321"},{"reference_url":"https://security.gentoo.org/glsa/201201-13","reference_id":"GLSA-201201-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0423","reference_id":"RHSA-2010:0423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0873","reference_id":"RHSA-2010:0873","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0873"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0935","reference_id":"RHSA-2010:0935","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0935"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0152","reference_id":"RHSA-2011:0152","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0152"},{"reference_url":"https://usn.ubuntu.com/940-1/","reference_id":"USN-940-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/940-1/"},{"reference_url":"https://usn.ubuntu.com/940-2/","reference_id":"USN-940-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/940-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926426?format=json","purl":"pkg:deb/debian/krb5@1.8.1%2Bdfsg-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.8.1%252Bdfsg-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2010-1321"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jfb1-3vg4-vbap"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41396?format=json","vulnerability_id":"VCID-ka4c-q3hq-6fe3","summary":"Multiple vulnerabilities have been discovered in MIT Kerberos 5,\n    allowing execution of arbitrary code or Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1418.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1418.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1418","reference_id":"","reference_type":"","scores":[{"value":"0.07674","scoring_system":"epss","scoring_elements":"0.91863","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07674","scoring_system":"epss","scoring_elements":"0.91872","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07674","scoring_system":"epss","scoring_elements":"0.91879","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07674","scoring_system":"epss","scoring_elements":"0.91886","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07674","scoring_system":"epss","scoring_elements":"0.91898","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07674","scoring_system":"epss","scoring_elements":"0.91904","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07674","scoring_system":"epss","scoring_elements":"0.91907","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07674","scoring_system":"epss","scoring_elements":"0.91903","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07674","scoring_system":"epss","scoring_elements":"0.91922","published_at":"2026-04-16T12:55:00Z"},{"value":"0.07674","scoring_system":"epss","scoring_elements":"0.91919","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07674","scoring_system":"epss","scoring_elements":"0.91915","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07674","scoring_system":"epss","scoring_elements":"0.91921","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1418"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1418"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1026942","reference_id":"1026942","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1026942"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=728845","reference_id":"728845","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=728845"},{"reference_url":"https://security.gentoo.org/glsa/201312-12","reference_id":"GLSA-201312-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201312-12"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1245","reference_id":"RHSA-2014:1245","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1245"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1389","reference_id":"RHSA-2014:1389","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1389"},{"reference_url":"https://usn.ubuntu.com/2310-1/","reference_id":"USN-2310-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2310-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926441?format=json","purl":"pkg:deb/debian/krb5@1.11.3%2Bdfsg-3%2Bnmu1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.11.3%252Bdfsg-3%252Bnmu1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2013-1418"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ka4c-q3hq-6fe3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77777?format=json","vulnerability_id":"VCID-khdw-3p5j-vya6","summary":"krb5: overflow when calculating ulog block size","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24528.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24528.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24528","reference_id":"","reference_type":"","scores":[{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42933","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42757","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42991","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42978","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42916","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42839","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.4284","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.4296","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42898","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42948","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42983","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42931","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24528"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24528","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24528"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1094730","reference_id":"1094730","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1094730"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2342796","reference_id":"2342796","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2342796"},{"reference_url":"https://github.com/krb5/krb5/commit/78ceba024b64d49612375be4a12d1c066b0bfbd0","reference_id":"78ceba024b64d49612375be4a12d1c066b0bfbd0","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-16T17:39:31Z/"}],"url":"https://github.com/krb5/krb5/commit/78ceba024b64d49612375be4a12d1c066b0bfbd0"},{"reference_url":"https://github.com/krb5/krb5/compare/krb5-1.21.3-final...krb5-1.22-final","reference_id":"krb5-1.21.3-final...krb5-1.22-final","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-16T17:39:31Z/"}],"url":"https://github.com/krb5/krb5/compare/krb5-1.21.3-final...krb5-1.22-final"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1352","reference_id":"RHSA-2025:1352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2722","reference_id":"RHSA-2025:2722","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2722"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2789","reference_id":"RHSA-2025:2789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7067","reference_id":"RHSA-2025:7067","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7067"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8385","reference_id":"RHSA-2025:8385","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8385"},{"reference_url":"https://usn.ubuntu.com/7314-1/","reference_id":"USN-7314-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7314-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926472?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926469?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2025-24528"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-khdw-3p5j-vya6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89824?format=json","vulnerability_id":"VCID-kmgq-s8my-u7cm","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-1235.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-1235.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2002-1235","reference_id":"","reference_type":"","scores":[{"value":"0.32917","scoring_system":"epss","scoring_elements":"0.96856","published_at":"2026-04-01T12:55:00Z"},{"value":"0.32917","scoring_system":"epss","scoring_elements":"0.96864","published_at":"2026-04-02T12:55:00Z"},{"value":"0.32917","scoring_system":"epss","scoring_elements":"0.96868","published_at":"2026-04-04T12:55:00Z"},{"value":"0.32917","scoring_system":"epss","scoring_elements":"0.96873","published_at":"2026-04-07T12:55:00Z"},{"value":"0.32917","scoring_system":"epss","scoring_elements":"0.96881","published_at":"2026-04-08T12:55:00Z"},{"value":"0.32917","scoring_system":"epss","scoring_elements":"0.96883","published_at":"2026-04-09T12:55:00Z"},{"value":"0.32917","scoring_system":"epss","scoring_elements":"0.96885","published_at":"2026-04-11T12:55:00Z"},{"value":"0.32917","scoring_system":"epss","scoring_elements":"0.96887","published_at":"2026-04-12T12:55:00Z"},{"value":"0.32917","scoring_system":"epss","scoring_elements":"0.96888","published_at":"2026-04-13T12:55:00Z"},{"value":"0.32917","scoring_system":"epss","scoring_elements":"0.96895","published_at":"2026-04-16T12:55:00Z"},{"value":"0.32917","scoring_system":"epss","scoring_elements":"0.969","published_at":"2026-04-18T12:55:00Z"},{"value":"0.32917","scoring_system":"epss","scoring_elements":"0.96903","published_at":"2026-04-24T12:55:00Z"},{"value":"0.32917","scoring_system":"epss","scoring_elements":"0.96906","published_at":"2026-04-26T12:55:00Z"},{"value":"0.32917","scoring_system":"epss","scoring_elements":"0.96909","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2002-1235"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1235","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1235"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1616862","reference_id":"1616862","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1616862"},{"reference_url":"https://access.redhat.com/errata/RHSA-2002:242","reference_id":"RHSA-2002:242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2002:242"},{"reference_url":"https://access.redhat.com/errata/RHSA-2002:250","reference_id":"RHSA-2002:250","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2002:250"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:168","reference_id":"RHSA-2003:168","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:168"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926398?format=json","purl":"pkg:deb/debian/krb5@1.2.6-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.2.6-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2002-1235"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kmgq-s8my-u7cm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57883?format=json","vulnerability_id":"VCID-ktam-mx9t-jqa2","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9422.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9422.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9422","reference_id":"","reference_type":"","scores":[{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.74027","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73896","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73906","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.7393","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73901","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73935","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73948","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73971","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73953","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73945","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73986","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73995","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73987","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.7402","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.74029","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9422"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5352","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5352"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9421"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9422","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9422"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9423","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9423"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1179861","reference_id":"1179861","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1179861"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0439","reference_id":"RHSA-2015:0439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0794","reference_id":"RHSA-2015:0794","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0794"},{"reference_url":"https://usn.ubuntu.com/2498-1/","reference_id":"USN-2498-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2498-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926446?format=json","purl":"pkg:deb/debian/krb5@1.12.1%2Bdfsg-17?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-17%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2014-9422"],"risk_score":1.1,"exploitability":"0.5","weighted_severity":"2.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ktam-mx9t-jqa2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62436?format=json","vulnerability_id":"VCID-mjvu-45rb-6kf8","summary":"Multiple vulnerabilities have been found in MIT Kerberos 5, the\n    most severe of which may allow remote execution of arbitrary code.","references":[{"reference_url":"http://kb.vmware.com/kb/1035108","reference_id":"","reference_type":"","scores":[],"url":"http://kb.vmware.com/kb/1035108"},{"reference_url":"http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051976.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051976.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051999.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051999.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00010.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00010.html"},{"reference_url":"http://lists.vmware.com/pipermail/security-announce/2011/000133.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.vmware.com/pipermail/security-announce/2011/000133.html"},{"reference_url":"http://marc.info/?l=bugtraq&m=129562442714657&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=129562442714657&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=130497213107107&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=130497213107107&w=2"},{"reference_url":"http://osvdb.org/69610","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/69610"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1323.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1323.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1323","reference_id":"","reference_type":"","scores":[{"value":"0.04735","scoring_system":"epss","scoring_elements":"0.89441","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04735","scoring_system":"epss","scoring_elements":"0.89439","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04735","scoring_system":"epss","scoring_elements":"0.89365","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04735","scoring_system":"epss","scoring_elements":"0.8937","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04735","scoring_system":"epss","scoring_elements":"0.89381","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04735","scoring_system":"epss","scoring_elements":"0.89383","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04735","scoring_system":"epss","scoring_elements":"0.894","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04735","scoring_system":"epss","scoring_elements":"0.89403","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04735","scoring_system":"epss","scoring_elements":"0.89411","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04735","scoring_system":"epss","scoring_elements":"0.89409","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04735","scoring_system":"epss","scoring_elements":"0.89404","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04735","scoring_system":"epss","scoring_elements":"0.89419","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04735","scoring_system":"epss","scoring_elements":"0.89421","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04735","scoring_system":"epss","scoring_elements":"0.89435","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1323"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1323"},{"reference_url":"http://secunia.com/advisories/42399","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42399"},{"reference_url":"http://secunia.com/advisories/42420","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42420"},{"reference_url":"http://secunia.com/advisories/42436","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42436"},{"reference_url":"http://secunia.com/advisories/43015","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43015"},{"reference_url":"http://secunia.com/advisories/46397","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/46397"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12121","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12121"},{"reference_url":"http://support.apple.com/kb/HT4581","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4581"},{"reference_url":"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt","reference_id":"","reference_type":"","scores":[],"url":"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt"},{"reference_url":"http://www.debian.org/security/2010/dsa-2129","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2010/dsa-2129"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:245","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:245"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:246","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:246"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0925.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0925.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0926.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0926.html"},{"reference_url":"http://www.securityfocus.com/archive/1/514953/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/514953/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/517739/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/517739/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/520102/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/520102/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/45118","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/45118"},{"reference_url":"http://www.securitytracker.com/id?1024803","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1024803"},{"reference_url":"http://www.ubuntu.com/usn/USN-1030-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1030-1"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2011-0007.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2011-0007.html"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3094","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3094"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3095","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3095"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3101","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3101"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3118","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3118"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0187","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0187"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605553","reference_id":"605553","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605553"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=648734","reference_id":"648734","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=648734"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3:alpha1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.3:alpha1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3:alpha1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.5.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.5.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos:5-1.5.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.5.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-1323","reference_id":"CVE-2010-1323","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:P/A:N"},{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-1323"},{"reference_url":"https://security.gentoo.org/glsa/201201-13","reference_id":"GLSA-201201-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0925","reference_id":"RHSA-2010:0925","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0925"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0926","reference_id":"RHSA-2010:0926","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0926"},{"reference_url":"https://usn.ubuntu.com/1030-1/","reference_id":"USN-1030-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1030-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926428?format=json","purl":"pkg:deb/debian/krb5@1.8.3%2Bdfsg-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.8.3%252Bdfsg-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2010-1323"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mjvu-45rb-6kf8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89718?format=json","vulnerability_id":"VCID-mm4z-q2ez-xkcg","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0082.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0082.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2003-0082","reference_id":"","reference_type":"","scores":[{"value":"0.02545","scoring_system":"epss","scoring_elements":"0.85399","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02545","scoring_system":"epss","scoring_elements":"0.85412","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02545","scoring_system":"epss","scoring_elements":"0.85431","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02545","scoring_system":"epss","scoring_elements":"0.85434","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02545","scoring_system":"epss","scoring_elements":"0.85455","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02545","scoring_system":"epss","scoring_elements":"0.85463","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02545","scoring_system":"epss","scoring_elements":"0.85478","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02545","scoring_system":"epss","scoring_elements":"0.85476","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02545","scoring_system":"epss","scoring_elements":"0.85472","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02545","scoring_system":"epss","scoring_elements":"0.85496","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02545","scoring_system":"epss","scoring_elements":"0.85501","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02545","scoring_system":"epss","scoring_elements":"0.85497","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02545","scoring_system":"epss","scoring_elements":"0.8552","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02545","scoring_system":"epss","scoring_elements":"0.85529","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02545","scoring_system":"epss","scoring_elements":"0.85528","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2003-0082"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0082","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0082"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1616960","reference_id":"1616960","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1616960"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:051","reference_id":"RHSA-2003:051","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:051"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:052","reference_id":"RHSA-2003:052","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:052"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:091","reference_id":"RHSA-2003:091","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:091"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:168","reference_id":"RHSA-2003:168","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:168"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926400?format=json","purl":"pkg:deb/debian/krb5@1.3.3-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.3.3-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2003-0082"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mm4z-q2ez-xkcg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62440?format=json","vulnerability_id":"VCID-mqs4-crva-ayaz","summary":"Multiple vulnerabilities have been found in MIT Kerberos 5, the\n    most severe of which may allow remote execution of arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4022.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4022.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4022","reference_id":"","reference_type":"","scores":[{"value":"0.08988","scoring_system":"epss","scoring_elements":"0.92631","published_at":"2026-04-26T12:55:00Z"},{"value":"0.08988","scoring_system":"epss","scoring_elements":"0.92578","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08988","scoring_system":"epss","scoring_elements":"0.92583","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08988","scoring_system":"epss","scoring_elements":"0.9259","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08988","scoring_system":"epss","scoring_elements":"0.92591","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08988","scoring_system":"epss","scoring_elements":"0.92602","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08988","scoring_system":"epss","scoring_elements":"0.92607","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08988","scoring_system":"epss","scoring_elements":"0.92613","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08988","scoring_system":"epss","scoring_elements":"0.92614","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08988","scoring_system":"epss","scoring_elements":"0.92626","published_at":"2026-04-29T12:55:00Z"},{"value":"0.08988","scoring_system":"epss","scoring_elements":"0.92625","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08988","scoring_system":"epss","scoring_elements":"0.92628","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4022"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4022","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4022"},{"reference_url":"http://secunia.com/advisories/43260","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43260"},{"reference_url":"http://secunia.com/advisories/43275","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43275"},{"reference_url":"http://securityreason.com/securityalert/8070","reference_id":"","reference_type":"","scores":[],"url":"http://securityreason.com/securityalert/8070"},{"reference_url":"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-001.txt","reference_id":"","reference_type":"","scores":[],"url":"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-001.txt"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:025","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:025"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0200.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0200.html"},{"reference_url":"http://www.securityfocus.com/archive/1/516286/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/516286/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/46269","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/46269"},{"reference_url":"http://www.securitytracker.com/id?1025035","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1025035"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0329","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0329"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0333","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0333"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0347","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0347"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0464","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0464"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=664009","reference_id":"664009","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=664009"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4022","reference_id":"CVE-2010-4022","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4022"},{"reference_url":"https://security.gentoo.org/glsa/201201-13","reference_id":"GLSA-201201-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0200","reference_id":"RHSA-2011:0200","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0200"},{"reference_url":"https://usn.ubuntu.com/1062-1/","reference_id":"USN-1062-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1062-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926429?format=json","purl":"pkg:deb/debian/krb5@1.8.3%2Bdfsg-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.8.3%252Bdfsg-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2010-4022"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mqs4-crva-ayaz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88597?format=json","vulnerability_id":"VCID-mqz8-mxsg-xqam","summary":"krb5: integer overflow in rpc lib","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5902.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5902.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5902","reference_id":"","reference_type":"","scores":[{"value":"0.04002","scoring_system":"epss","scoring_elements":"0.88382","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04002","scoring_system":"epss","scoring_elements":"0.8839","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04002","scoring_system":"epss","scoring_elements":"0.88399","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04002","scoring_system":"epss","scoring_elements":"0.88404","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04002","scoring_system":"epss","scoring_elements":"0.88423","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04002","scoring_system":"epss","scoring_elements":"0.88429","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04002","scoring_system":"epss","scoring_elements":"0.8844","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04002","scoring_system":"epss","scoring_elements":"0.88432","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04002","scoring_system":"epss","scoring_elements":"0.88446","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04002","scoring_system":"epss","scoring_elements":"0.88443","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04002","scoring_system":"epss","scoring_elements":"0.88441","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04002","scoring_system":"epss","scoring_elements":"0.88457","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04002","scoring_system":"epss","scoring_elements":"0.88462","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5902"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5902","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5902"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=415341","reference_id":"415341","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=415341"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454974","reference_id":"454974","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454974"},{"reference_url":"https://usn.ubuntu.com/924-1/","reference_id":"USN-924-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/924-1/"},{"reference_url":"https://usn.ubuntu.com/940-1/","reference_id":"USN-940-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/940-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926416?format=json","purl":"pkg:deb/debian/krb5@1.6.dfsg.4~beta1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.6.dfsg.4~beta1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2007-5902"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mqz8-mxsg-xqam"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89879?format=json","vulnerability_id":"VCID-mrha-gp2j-vkf7","summary":"security flaw","references":[{"reference_url":"ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-055.0.txt","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-055.0.txt"},{"reference_url":"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-011.txt.asc","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-011.txt.asc"},{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20020801-01-A","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"ftp://patches.sgi.com/support/free/security/advisories/20020801-01-A"},{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20020801-01-P","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"ftp://patches.sgi.com/support/free/security/advisories/20020801-01-P"},{"reference_url":"http://archives.neohapsis.com/archives/aix/2002-q4/0002.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://archives.neohapsis.com/archives/aix/2002-q4/0002.html"},{"reference_url":"http://archives.neohapsis.com/archives/bugtraq/2002-07/0514.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://archives.neohapsis.com/archives/bugtraq/2002-07/0514.html"},{"reference_url":"http://archives.neohapsis.com/archives/hp/2002-q3/0077.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://archives.neohapsis.com/archives/hp/2002-q3/0077.html"},{"reference_url":"http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=20823","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=20823"},{"reference_url":"http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000515","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000515"},{"reference_url":"http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000535","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000535"},{"reference_url":"http://marc.info/?l=bugtraq&m=102813809232532&w=2","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://marc.info/?l=bugtraq&m=102813809232532&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=102821785316087&w=2","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://marc.info/?l=bugtraq&m=102821785316087&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=102821928418261&w=2","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://marc.info/?l=bugtraq&m=102821928418261&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=102831443208382&w=2","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://marc.info/?l=bugtraq&m=102831443208382&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=103158632831416&w=2","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://marc.info/?l=bugtraq&m=103158632831416&w=2"},{"reference_url":"http://online.securityfocus.com/advisories/4402","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://online.securityfocus.com/advisories/4402"},{"reference_url":"http://online.securityfocus.com/archive/1/285740","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://online.securityfocus.com/archive/1/285740"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2002-166.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2002-166.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2002-172.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2002-172.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-0391.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-0391.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2002-0391","reference_id":"","reference_type":"","scores":[{"value":"0.08258","scoring_system":"epss","scoring_elements":"0.92246","published_at":"2026-04-29T12:55:00Z"},{"value":"0.08258","scoring_system":"epss","scoring_elements":"0.92198","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08258","scoring_system":"epss","scoring_elements":"0.92205","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08258","scoring_system":"epss","scoring_elements":"0.92211","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08258","scoring_system":"epss","scoring_elements":"0.92214","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08258","scoring_system":"epss","scoring_elements":"0.92225","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08258","scoring_system":"epss","scoring_elements":"0.92229","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08258","scoring_system":"epss","scoring_elements":"0.92234","published_at":"2026-04-11T12:55:00Z"},{"value":"0.08258","scoring_system":"epss","scoring_elements":"0.92235","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08258","scoring_system":"epss","scoring_elements":"0.92232","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08258","scoring_system":"epss","scoring_elements":"0.92244","published_at":"2026-04-16T12:55:00Z"},{"value":"0.08258","scoring_system":"epss","scoring_elements":"0.92243","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08258","scoring_system":"epss","scoring_elements":"0.92245","published_at":"2026-04-21T12:55:00Z"},{"value":"0.08258","scoring_system":"epss","scoring_elements":"0.92249","published_at":"2026-04-24T12:55:00Z"},{"value":"0.08258","scoring_system":"epss","scoring_elements":"0.9225","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2002-0391"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0391","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0391"},{"reference_url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-057","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-057"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A42","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A42"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4728","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4728"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9"},{"reference_url":"http://www.cert.org/advisories/CA-2002-25.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://www.cert.org/advisories/CA-2002-25.html"},{"reference_url":"http://www.debian.org/security/2002/dsa-142","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://www.debian.org/security/2002/dsa-142"},{"reference_url":"http://www.debian.org/security/2002/dsa-143","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://www.debian.org/security/2002/dsa-143"},{"reference_url":"http://www.debian.org/security/2002/dsa-146","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://www.debian.org/security/2002/dsa-146"},{"reference_url":"http://www.debian.org/security/2002/dsa-149","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://www.debian.org/security/2002/dsa-149"},{"reference_url":"http://www.debian.org/security/2003/dsa-333","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://www.debian.org/security/2003/dsa-333"},{"reference_url":"http://www.iss.net/security_center/static/9170.php","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://www.iss.net/security_center/static/9170.php"},{"reference_url":"http://www.kb.cert.org/vuls/id/192995","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://www.kb.cert.org/vuls/id/192995"},{"reference_url":"http://www.linuxsecurity.com/advisories/other_advisory-2399.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://www.linuxsecurity.com/advisories/other_advisory-2399.html"},{"reference_url":"http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:057","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:057"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2002-167.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://www.redhat.com/support/errata/RHSA-2002-167.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2002-173.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://www.redhat.com/support/errata/RHSA-2002-173.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2003-168.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://www.redhat.com/support/errata/RHSA-2003-168.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2003-212.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://www.redhat.com/support/errata/RHSA-2003-212.html"},{"reference_url":"http://www.securityfocus.com/bid/5356","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://www.securityfocus.com/bid/5356"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1616771","reference_id":"1616771","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1616771"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_2000:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows_2000:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_2000:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:openbsd:openbsd:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:solaris:9.0:*:*:*:*:sparc:*:*","reference_id":"cpe:2.3:o:sun:solaris:9.0:*:*:*:*:sparc:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:solaris:9.0:*:*:*:*:sparc:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2002-0391","reference_id":"CVE-2002-0391","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2002-0391"},{"reference_url":"https://access.redhat.com/errata/RHSA-2002:166","reference_id":"RHSA-2002:166","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2002:166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2002:167","reference_id":"RHSA-2002:167","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2002:167"},{"reference_url":"https://access.redhat.com/errata/RHSA-2002:172","reference_id":"RHSA-2002:172","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2002:172"},{"reference_url":"https://access.redhat.com/errata/RHSA-2002:173","reference_id":"RHSA-2002:173","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2002:173"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:168","reference_id":"RHSA-2003:168","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:168"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:212","reference_id":"RHSA-2003:212","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:212"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926394?format=json","purl":"pkg:deb/debian/krb5@1.2.5-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.2.5-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2002-0391"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mrha-gp2j-vkf7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46235?format=json","vulnerability_id":"VCID-mrjw-ybt8-p3bp","summary":"Multiple vulnerabilities in MIT Kerberos 5 could potentially result in\n    remote code execution with root privileges by unauthenticated users.","references":[{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc"},{"reference_url":"http://docs.info.apple.com/article.html?artnum=306172","reference_id":"","reference_type":"","scores":[],"url":"http://docs.info.apple.com/article.html?artnum=306172"},{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02257427","reference_id":"","reference_type":"","scores":[],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02257427"},{"reference_url":"http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html"},{"reference_url":"http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html"},{"reference_url":"http://osvdb.org/36596","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/36596"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2442.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2442.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-2442","reference_id":"","reference_type":"","scores":[{"value":"0.42571","scoring_system":"epss","scoring_elements":"0.97481","published_at":"2026-04-29T12:55:00Z"},{"value":"0.42571","scoring_system":"epss","scoring_elements":"0.97442","published_at":"2026-04-01T12:55:00Z"},{"value":"0.42571","scoring_system":"epss","scoring_elements":"0.97449","published_at":"2026-04-02T12:55:00Z"},{"value":"0.42571","scoring_system":"epss","scoring_elements":"0.97453","published_at":"2026-04-04T12:55:00Z"},{"value":"0.42571","scoring_system":"epss","scoring_elements":"0.97454","published_at":"2026-04-07T12:55:00Z"},{"value":"0.42571","scoring_system":"epss","scoring_elements":"0.9746","published_at":"2026-04-08T12:55:00Z"},{"value":"0.42571","scoring_system":"epss","scoring_elements":"0.97462","published_at":"2026-04-09T12:55:00Z"},{"value":"0.42571","scoring_system":"epss","scoring_elements":"0.97465","published_at":"2026-04-11T12:55:00Z"},{"value":"0.42571","scoring_system":"epss","scoring_elements":"0.97467","published_at":"2026-04-12T12:55:00Z"},{"value":"0.42571","scoring_system":"epss","scoring_elements":"0.97468","published_at":"2026-04-13T12:55:00Z"},{"value":"0.42571","scoring_system":"epss","scoring_elements":"0.97476","published_at":"2026-04-16T12:55:00Z"},{"value":"0.42571","scoring_system":"epss","scoring_elements":"0.97479","published_at":"2026-04-26T12:55:00Z"},{"value":"0.42571","scoring_system":"epss","scoring_elements":"0.97478","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-2442"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2442","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2442"},{"reference_url":"http://secunia.com/advisories/25800","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25800"},{"reference_url":"http://secunia.com/advisories/25801","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25801"},{"reference_url":"http://secunia.com/advisories/25814","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25814"},{"reference_url":"http://secunia.com/advisories/25821","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25821"},{"reference_url":"http://secunia.com/advisories/25841","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25841"},{"reference_url":"http://secunia.com/advisories/25870","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25870"},{"reference_url":"http://secunia.com/advisories/25888","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25888"},{"reference_url":"http://secunia.com/advisories/25890","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25890"},{"reference_url":"http://secunia.com/advisories/25894","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25894"},{"reference_url":"http://secunia.com/advisories/25911","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25911"},{"reference_url":"http://secunia.com/advisories/26033","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26033"},{"reference_url":"http://secunia.com/advisories/26228","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26228"},{"reference_url":"http://secunia.com/advisories/26235","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26235"},{"reference_url":"http://secunia.com/advisories/26909","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26909"},{"reference_url":"http://secunia.com/advisories/27706","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27706"},{"reference_url":"http://secunia.com/advisories/40346","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40346"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200707-11.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200707-11.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/35082","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/35082"},{"reference_url":"https://issues.rpath.com/browse/RPL-1499","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1499"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10631","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10631"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7344","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7344"},{"reference_url":"https://secure-support.novell.com/KanisaPlatform/Publishing/773/3248163_f.SAL_Public.html","reference_id":"","reference_type":"","scores":[],"url":"https://secure-support.novell.com/KanisaPlatform/Publishing/773/3248163_f.SAL_Public.html"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102914-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102914-1"},{"reference_url":"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2007-004.txt","reference_id":"","reference_type":"","scores":[],"url":"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2007-004.txt"},{"reference_url":"http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-004.txt","reference_id":"","reference_type":"","scores":[],"url":"http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-004.txt"},{"reference_url":"http://www.debian.org/security/2007/dsa-1323","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2007/dsa-1323"},{"reference_url":"http://www.kb.cert.org/vuls/id/356961","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/356961"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:137","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:137"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_38_krb5.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_38_krb5.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0384.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0384.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0562.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0562.html"},{"reference_url":"http://www.securityfocus.com/archive/1/472288/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/472288/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/472432/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/472432/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/472507/30/5970/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/472507/30/5970/threaded"},{"reference_url":"http://www.securityfocus.com/bid/24655","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/24655"},{"reference_url":"http://www.securityfocus.com/bid/25159","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/25159"},{"reference_url":"http://www.securitytracker.com/id?1018293","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1018293"},{"reference_url":"http://www.trustix.org/errata/2007/0021/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2007/0021/"},{"reference_url":"http://www.ubuntu.com/usn/usn-477-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-477-1"},{"reference_url":"http://www.us-cert.gov/cas/techalerts/TA07-177A.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.us-cert.gov/cas/techalerts/TA07-177A.html"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2337","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2337"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2354","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2354"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2491","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2491"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2732","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2732"},{"reference_url":"http://www.vupen.com/english/advisories/2007/3229","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/3229"},{"reference_url":"http://www.vupen.com/english/advisories/2010/1574","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/1574"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=245547","reference_id":"245547","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=245547"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=430787","reference_id":"430787","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=430787"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2442","reference_id":"CVE-2007-2442","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2442"},{"reference_url":"https://security.gentoo.org/glsa/200707-11","reference_id":"GLSA-200707-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200707-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0384","reference_id":"RHSA-2007:0384","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0384"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0562","reference_id":"RHSA-2007:0562","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0562"},{"reference_url":"https://usn.ubuntu.com/477-1/","reference_id":"USN-477-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/477-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926414?format=json","purl":"pkg:deb/debian/krb5@1.6.dfsg.1-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.6.dfsg.1-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2007-2442"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mrjw-ybt8-p3bp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46319?format=json","vulnerability_id":"VCID-n195-kd7a-b7ef","summary":"Multiple vulnerabilities have been found in MIT Kerberos 5, which could\n    allow a remote unauthenticated user to execute arbitrary code with root\n    privileges.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0063.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0063.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0063","reference_id":"","reference_type":"","scores":[{"value":"0.04904","scoring_system":"epss","scoring_elements":"0.89562","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04904","scoring_system":"epss","scoring_elements":"0.89565","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04904","scoring_system":"epss","scoring_elements":"0.89579","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04904","scoring_system":"epss","scoring_elements":"0.89595","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04904","scoring_system":"epss","scoring_elements":"0.896","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04904","scoring_system":"epss","scoring_elements":"0.89607","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04904","scoring_system":"epss","scoring_elements":"0.89614","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04904","scoring_system":"epss","scoring_elements":"0.89616","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04904","scoring_system":"epss","scoring_elements":"0.89611","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04904","scoring_system":"epss","scoring_elements":"0.89626","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04904","scoring_system":"epss","scoring_elements":"0.89629","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04904","scoring_system":"epss","scoring_elements":"0.8963","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0063"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0063","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0063"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=432621","reference_id":"432621","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=432621"},{"reference_url":"https://security.gentoo.org/glsa/200803-31","reference_id":"GLSA-200803-31","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200803-31"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0164","reference_id":"RHSA-2008:0164","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0180","reference_id":"RHSA-2008:0180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0181","reference_id":"RHSA-2008:0181","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0181"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0182","reference_id":"RHSA-2008:0182","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0182"},{"reference_url":"https://usn.ubuntu.com/587-1/","reference_id":"USN-587-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/587-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926417?format=json","purl":"pkg:deb/debian/krb5@1.6.dfsg.3~beta1-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.6.dfsg.3~beta1-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2008-0063"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n195-kd7a-b7ef"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89428?format=json","vulnerability_id":"VCID-n4bz-z5rx-t3dy","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0643.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0643.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2004-0643","reference_id":"","reference_type":"","scores":[{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32782","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32913","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32948","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.3277","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32817","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32846","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32848","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.3281","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32784","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32828","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32804","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32771","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.3262","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32504","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32422","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2004-0643"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0643","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0643"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617247","reference_id":"1617247","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617247"},{"reference_url":"https://access.redhat.com/errata/RHSA-2004:350","reference_id":"RHSA-2004:350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2004:350"},{"reference_url":"https://access.redhat.com/errata/RHSA-2004:448","reference_id":"RHSA-2004:448","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2004:448"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926405?format=json","purl":"pkg:deb/debian/krb5@1.3.4-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.3.4-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2004-0643"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n4bz-z5rx-t3dy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41393?format=json","vulnerability_id":"VCID-n4xu-cnqt-gbgf","summary":"Multiple vulnerabilities have been discovered in MIT Kerberos 5,\n    allowing execution of arbitrary code or Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1015.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1015.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1015","reference_id":"","reference_type":"","scores":[{"value":"0.01234","scoring_system":"epss","scoring_elements":"0.79274","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01234","scoring_system":"epss","scoring_elements":"0.79143","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01234","scoring_system":"epss","scoring_elements":"0.7915","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01234","scoring_system":"epss","scoring_elements":"0.79175","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01234","scoring_system":"epss","scoring_elements":"0.7916","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01234","scoring_system":"epss","scoring_elements":"0.79185","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01234","scoring_system":"epss","scoring_elements":"0.79193","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01234","scoring_system":"epss","scoring_elements":"0.79217","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01234","scoring_system":"epss","scoring_elements":"0.79202","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01234","scoring_system":"epss","scoring_elements":"0.79194","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01234","scoring_system":"epss","scoring_elements":"0.79219","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01234","scoring_system":"epss","scoring_elements":"0.79216","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01234","scoring_system":"epss","scoring_elements":"0.79251","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01234","scoring_system":"epss","scoring_elements":"0.79258","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1015"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1015","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1015"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683429","reference_id":"683429","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683429"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=838012","reference_id":"838012","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=838012"},{"reference_url":"https://security.gentoo.org/glsa/201312-12","reference_id":"GLSA-201312-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201312-12"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1131","reference_id":"RHSA-2012:1131","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1131"},{"reference_url":"https://usn.ubuntu.com/1520-1/","reference_id":"USN-1520-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1520-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926437?format=json","purl":"pkg:deb/debian/krb5@1.10.1%2Bdfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2012-1015"],"risk_score":1.2,"exploitability":"0.5","weighted_severity":"2.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n4xu-cnqt-gbgf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89767?format=json","vulnerability_id":"VCID-na1r-ae6q-7fgx","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0058.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0058.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2003-0058","reference_id":"","reference_type":"","scores":[{"value":"0.19337","scoring_system":"epss","scoring_elements":"0.95339","published_at":"2026-04-01T12:55:00Z"},{"value":"0.19337","scoring_system":"epss","scoring_elements":"0.95348","published_at":"2026-04-02T12:55:00Z"},{"value":"0.19337","scoring_system":"epss","scoring_elements":"0.95354","published_at":"2026-04-04T12:55:00Z"},{"value":"0.19337","scoring_system":"epss","scoring_elements":"0.95359","published_at":"2026-04-07T12:55:00Z"},{"value":"0.19337","scoring_system":"epss","scoring_elements":"0.95366","published_at":"2026-04-08T12:55:00Z"},{"value":"0.19337","scoring_system":"epss","scoring_elements":"0.95368","published_at":"2026-04-09T12:55:00Z"},{"value":"0.19337","scoring_system":"epss","scoring_elements":"0.95373","published_at":"2026-04-12T12:55:00Z"},{"value":"0.19337","scoring_system":"epss","scoring_elements":"0.95375","published_at":"2026-04-13T12:55:00Z"},{"value":"0.19337","scoring_system":"epss","scoring_elements":"0.95382","published_at":"2026-04-16T12:55:00Z"},{"value":"0.19337","scoring_system":"epss","scoring_elements":"0.95387","published_at":"2026-04-18T12:55:00Z"},{"value":"0.19337","scoring_system":"epss","scoring_elements":"0.95389","published_at":"2026-04-21T12:55:00Z"},{"value":"0.19337","scoring_system":"epss","scoring_elements":"0.9539","published_at":"2026-04-24T12:55:00Z"},{"value":"0.19337","scoring_system":"epss","scoring_elements":"0.95392","published_at":"2026-04-26T12:55:00Z"},{"value":"0.19337","scoring_system":"epss","scoring_elements":"0.95393","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2003-0058"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0058","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0058"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1616945","reference_id":"1616945","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1616945"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:051","reference_id":"RHSA-2003:051","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:051"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:052","reference_id":"RHSA-2003:052","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:052"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:168","reference_id":"RHSA-2003:168","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:168"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926402?format=json","purl":"pkg:deb/debian/krb5@1.2.5-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.2.5-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2003-0058"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-na1r-ae6q-7fgx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36510?format=json","vulnerability_id":"VCID-nfdc-b81u-hqh4","summary":"Some applications shipped with MIT Kerberos 5 are vulnerable to local\n    privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3083.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3083.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-3083","reference_id":"","reference_type":"","scores":[{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21572","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21745","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.218","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21551","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21628","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21686","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21697","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21659","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21602","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.216","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21607","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21577","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2143","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21424","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21412","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-3083"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3083","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3083"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618134","reference_id":"1618134","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618134"},{"reference_url":"https://security.gentoo.org/glsa/200608-15","reference_id":"GLSA-200608-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200608-15"},{"reference_url":"https://security.gentoo.org/glsa/200608-21","reference_id":"GLSA-200608-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200608-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0612","reference_id":"RHSA-2006:0612","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0612"},{"reference_url":"https://usn.ubuntu.com/334-1/","reference_id":"USN-334-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/334-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926411?format=json","purl":"pkg:deb/debian/krb5@1.4.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.4.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2006-3083"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nfdc-b81u-hqh4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62433?format=json","vulnerability_id":"VCID-nguz-sg5j-87db","summary":"Multiple vulnerabilities have been found in MIT Kerberos 5, the\n    most severe of which may allow remote execution of arbitrary code.","references":[{"reference_url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=577490","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=577490"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Jun/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Jun/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1320.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1320.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1320","reference_id":"","reference_type":"","scores":[{"value":"0.22068","scoring_system":"epss","scoring_elements":"0.95805","published_at":"2026-04-26T12:55:00Z"},{"value":"0.22068","scoring_system":"epss","scoring_elements":"0.9575","published_at":"2026-04-01T12:55:00Z"},{"value":"0.22068","scoring_system":"epss","scoring_elements":"0.95759","published_at":"2026-04-02T12:55:00Z"},{"value":"0.22068","scoring_system":"epss","scoring_elements":"0.95767","published_at":"2026-04-04T12:55:00Z"},{"value":"0.22068","scoring_system":"epss","scoring_elements":"0.9577","published_at":"2026-04-07T12:55:00Z"},{"value":"0.22068","scoring_system":"epss","scoring_elements":"0.95778","published_at":"2026-04-08T12:55:00Z"},{"value":"0.22068","scoring_system":"epss","scoring_elements":"0.95781","published_at":"2026-04-09T12:55:00Z"},{"value":"0.22068","scoring_system":"epss","scoring_elements":"0.95785","published_at":"2026-04-11T12:55:00Z"},{"value":"0.22068","scoring_system":"epss","scoring_elements":"0.95784","published_at":"2026-04-12T12:55:00Z"},{"value":"0.22068","scoring_system":"epss","scoring_elements":"0.95786","published_at":"2026-04-13T12:55:00Z"},{"value":"0.22068","scoring_system":"epss","scoring_elements":"0.95796","published_at":"2026-04-16T12:55:00Z"},{"value":"0.22068","scoring_system":"epss","scoring_elements":"0.95801","published_at":"2026-04-18T12:55:00Z"},{"value":"0.22068","scoring_system":"epss","scoring_elements":"0.95802","published_at":"2026-04-21T12:55:00Z"},{"value":"0.22068","scoring_system":"epss","scoring_elements":"0.95804","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1320"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1320","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1320"},{"reference_url":"http://secunia.com/advisories/39656","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/39656"},{"reference_url":"http://secunia.com/advisories/39784","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/39784"},{"reference_url":"http://secunia.com/advisories/40220","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40220"},{"reference_url":"http://securitytracker.com/id?1023904","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1023904"},{"reference_url":"http://support.apple.com/kb/HT4188","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4188"},{"reference_url":"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-004.txt","reference_id":"","reference_type":"","scores":[],"url":"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-004.txt"},{"reference_url":"http://www.securityfocus.com/archive/1/510843/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/510843/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/39599","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/39599"},{"reference_url":"http://www.ubuntu.com/usn/USN-940-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-940-1"},{"reference_url":"http://www.vupen.com/english/advisories/2010/1001","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/1001"},{"reference_url":"http://www.vupen.com/english/advisories/2010/1192","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/1192"},{"reference_url":"http://www.vupen.com/english/advisories/2010/1481","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/1481"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=577490","reference_id":"577490","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=577490"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=581922","reference_id":"581922","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=581922"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-1320","reference_id":"CVE-2010-1320","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-1320"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/33855.txt","reference_id":"CVE-2010-1320;OSVDB-63975","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/33855.txt"},{"reference_url":"https://www.securityfocus.com/bid/39599/info","reference_id":"CVE-2010-1320;OSVDB-63975","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/39599/info"},{"reference_url":"https://security.gentoo.org/glsa/201201-13","reference_id":"GLSA-201201-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-13"},{"reference_url":"https://usn.ubuntu.com/940-1/","reference_id":"USN-940-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/940-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926425?format=json","purl":"pkg:deb/debian/krb5@1.8.1%2Bdfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.8.1%252Bdfsg-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2010-1320"],"risk_score":7.2,"exploitability":"2.0","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nguz-sg5j-87db"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36511?format=json","vulnerability_id":"VCID-nrg2-bfrd-93aw","summary":"Some applications shipped with MIT Kerberos 5 are vulnerable to local\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-3084","reference_id":"","reference_type":"","scores":[{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.6747","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67506","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67528","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67558","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67571","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67594","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.6758","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67548","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67583","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67595","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67574","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67593","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67604","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67606","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-3084"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3084","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3084"},{"reference_url":"https://security.gentoo.org/glsa/200608-15","reference_id":"GLSA-200608-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200608-15"},{"reference_url":"https://security.gentoo.org/glsa/200608-21","reference_id":"GLSA-200608-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200608-21"},{"reference_url":"https://usn.ubuntu.com/334-1/","reference_id":"USN-334-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/334-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926411?format=json","purl":"pkg:deb/debian/krb5@1.4.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.4.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2006-3084"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nrg2-bfrd-93aw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89156?format=json","vulnerability_id":"VCID-ny6v-nczj-x7dw","summary":"security flaw","references":[{"reference_url":"ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:01.telnet.asc","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:01.telnet.asc"},{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20050405-01-P","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20050405-01-P"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0469.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0469.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-0469","reference_id":"","reference_type":"","scores":[{"value":"0.4782","scoring_system":"epss","scoring_elements":"0.97726","published_at":"2026-04-29T12:55:00Z"},{"value":"0.4782","scoring_system":"epss","scoring_elements":"0.97689","published_at":"2026-04-01T12:55:00Z"},{"value":"0.4782","scoring_system":"epss","scoring_elements":"0.97696","published_at":"2026-04-02T12:55:00Z"},{"value":"0.4782","scoring_system":"epss","scoring_elements":"0.97697","published_at":"2026-04-07T12:55:00Z"},{"value":"0.4782","scoring_system":"epss","scoring_elements":"0.97701","published_at":"2026-04-08T12:55:00Z"},{"value":"0.4782","scoring_system":"epss","scoring_elements":"0.97704","published_at":"2026-04-09T12:55:00Z"},{"value":"0.4782","scoring_system":"epss","scoring_elements":"0.97708","published_at":"2026-04-11T12:55:00Z"},{"value":"0.4782","scoring_system":"epss","scoring_elements":"0.9771","published_at":"2026-04-12T12:55:00Z"},{"value":"0.4782","scoring_system":"epss","scoring_elements":"0.97711","published_at":"2026-04-13T12:55:00Z"},{"value":"0.4782","scoring_system":"epss","scoring_elements":"0.97717","published_at":"2026-04-16T12:55:00Z"},{"value":"0.4782","scoring_system":"epss","scoring_elements":"0.9772","published_at":"2026-04-24T12:55:00Z"},{"value":"0.4782","scoring_system":"epss","scoring_elements":"0.97721","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-0469"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0469","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0469"},{"reference_url":"http://secunia.com/advisories/14745","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/14745"},{"reference_url":"http://secunia.com/advisories/17899","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17899"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9708","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9708"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-101665-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-101665-1"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-101671-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-101671-1"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-57755-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-57755-1"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-57761-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-57761-1"},{"reference_url":"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-001-telnet.txt","reference_id":"","reference_type":"","scores":[],"url":"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-001-telnet.txt"},{"reference_url":"http://www.debian.de/security/2005/dsa-731","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.de/security/2005/dsa-731"},{"reference_url":"http://www.debian.org/security/2005/dsa-697","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-697"},{"reference_url":"http://www.debian.org/security/2005/dsa-699","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-699"},{"reference_url":"http://www.debian.org/security/2005/dsa-703","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-703"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200503-36.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200503-36.xml"},{"reference_url":"http://www.idefense.com/application/poi/display?id=220&type=vulnerabilities","reference_id":"","reference_type":"","scores":[],"url":"http://www.idefense.com/application/poi/display?id=220&type=vulnerabilities"},{"reference_url":"http://www.kb.cert.org/vuls/id/291924","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/291924"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:061","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:061"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-327.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-327.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-330.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-330.html"},{"reference_url":"http://www.securityfocus.com/bid/12918","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/12918"},{"reference_url":"http://www.ubuntulinux.org/usn/usn-224-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntulinux.org/usn/usn-224-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617528","reference_id":"1617528","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617528"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=302036","reference_id":"302036","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=302036"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ncsa:telnet:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ncsa:telnet:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ncsa:telnet:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-0469","reference_id":"CVE-2005-0469","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-0469"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:327","reference_id":"RHSA-2005:327","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:327"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:330","reference_id":"RHSA-2005:330","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:330"},{"reference_url":"https://usn.ubuntu.com/101-1/","reference_id":"USN-101-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/101-1/"},{"reference_url":"https://usn.ubuntu.com/224-1/","reference_id":"USN-224-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/224-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926408?format=json","purl":"pkg:deb/debian/krb5@1.3.6-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.3.6-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2005-0469"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ny6v-nczj-x7dw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62438?format=json","vulnerability_id":"VCID-p65d-bnug-c7fr","summary":"Multiple vulnerabilities have been found in MIT Kerberos 5, the\n    most severe of which may allow remote execution of arbitrary code.","references":[{"reference_url":"http://kb.vmware.com/kb/1035108","reference_id":"","reference_type":"","scores":[],"url":"http://kb.vmware.com/kb/1035108"},{"reference_url":"http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051976.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051976.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051999.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051999.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html"},{"reference_url":"http://lists.vmware.com/pipermail/security-announce/2011/000133.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.vmware.com/pipermail/security-announce/2011/000133.html"},{"reference_url":"http://osvdb.org/69608","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/69608"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4020.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4020.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4020","reference_id":"","reference_type":"","scores":[{"value":"0.00535","scoring_system":"epss","scoring_elements":"0.67497","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00535","scoring_system":"epss","scoring_elements":"0.67496","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00535","scoring_system":"epss","scoring_elements":"0.67362","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00535","scoring_system":"epss","scoring_elements":"0.67398","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00535","scoring_system":"epss","scoring_elements":"0.6742","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00535","scoring_system":"epss","scoring_elements":"0.6745","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00535","scoring_system":"epss","scoring_elements":"0.67464","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00535","scoring_system":"epss","scoring_elements":"0.67486","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00535","scoring_system":"epss","scoring_elements":"0.67473","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00535","scoring_system":"epss","scoring_elements":"0.6744","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00535","scoring_system":"epss","scoring_elements":"0.67476","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00535","scoring_system":"epss","scoring_elements":"0.67488","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00535","scoring_system":"epss","scoring_elements":"0.67467","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00535","scoring_system":"epss","scoring_elements":"0.67485","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4020"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4020","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4020"},{"reference_url":"http://secunia.com/advisories/42399","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42399"},{"reference_url":"http://support.apple.com/kb/HT4581","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4581"},{"reference_url":"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt","reference_id":"","reference_type":"","scores":[],"url":"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:246","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:246"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0925.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0925.html"},{"reference_url":"http://www.securityfocus.com/archive/1/514953/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/514953/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/517739/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/517739/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/45117","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/45117"},{"reference_url":"http://www.securitytracker.com/id?1024803","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1024803"},{"reference_url":"http://www.ubuntu.com/usn/USN-1030-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1030-1"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2011-0007.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2011-0007.html"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3094","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3094"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3095","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3095"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3118","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3118"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605553","reference_id":"605553","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605553"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=648735","reference_id":"648735","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=648735"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4020","reference_id":"CVE-2010-4020","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:N/I:P/A:N"},{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4020"},{"reference_url":"https://security.gentoo.org/glsa/201201-13","reference_id":"GLSA-201201-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0925","reference_id":"RHSA-2010:0925","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0925"},{"reference_url":"https://usn.ubuntu.com/1030-1/","reference_id":"USN-1030-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1030-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926428?format=json","purl":"pkg:deb/debian/krb5@1.8.3%2Bdfsg-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.8.3%252Bdfsg-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2010-4020"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p65d-bnug-c7fr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46314?format=json","vulnerability_id":"VCID-pw5t-tpab-vbas","summary":"Multiple vulnerabilities have been found in MIT Kerberos 5, which could\n    allow a remote unauthenticated user to execute arbitrary code with root\n    privileges.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5971.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5971.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5971","reference_id":"","reference_type":"","scores":[{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23691","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23807","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23847","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23624","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23693","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23739","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23755","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23712","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23656","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23668","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23659","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.2364","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23529","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23519","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23482","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5971"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5971","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5971"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=415351","reference_id":"415351","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=415351"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454974","reference_id":"454974","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454974"},{"reference_url":"https://security.gentoo.org/glsa/200803-31","reference_id":"GLSA-200803-31","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200803-31"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0164","reference_id":"RHSA-2008:0164","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0180","reference_id":"RHSA-2008:0180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0180"},{"reference_url":"https://usn.ubuntu.com/924-1/","reference_id":"USN-924-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/924-1/"},{"reference_url":"https://usn.ubuntu.com/940-1/","reference_id":"USN-940-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/940-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926416?format=json","purl":"pkg:deb/debian/krb5@1.6.dfsg.4~beta1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.6.dfsg.4~beta1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2007-5971"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pw5t-tpab-vbas"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51590?format=json","vulnerability_id":"VCID-q2tg-s1kk-4bhc","summary":"Multiple vulnerabilities have been discovered in MIT Kerberos 5,\n    the worst of which may allow remote attackers to cause Denial of Service.","references":[{"reference_url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=8244","reference_id":"","reference_type":"","scores":[],"url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=8244"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2696.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2696.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2696","reference_id":"","reference_type":"","scores":[{"value":"0.08283","scoring_system":"epss","scoring_elements":"0.9226","published_at":"2026-04-29T12:55:00Z"},{"value":"0.08283","scoring_system":"epss","scoring_elements":"0.92264","published_at":"2026-04-26T12:55:00Z"},{"value":"0.08283","scoring_system":"epss","scoring_elements":"0.92212","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08283","scoring_system":"epss","scoring_elements":"0.92219","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08283","scoring_system":"epss","scoring_elements":"0.92225","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08283","scoring_system":"epss","scoring_elements":"0.92228","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08283","scoring_system":"epss","scoring_elements":"0.92239","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08283","scoring_system":"epss","scoring_elements":"0.92243","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08283","scoring_system":"epss","scoring_elements":"0.92248","published_at":"2026-04-11T12:55:00Z"},{"value":"0.08283","scoring_system":"epss","scoring_elements":"0.92249","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08283","scoring_system":"epss","scoring_elements":"0.92246","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08283","scoring_system":"epss","scoring_elements":"0.92258","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08283","scoring_system":"epss","scoring_elements":"0.92259","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2696"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2695","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2695"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2696","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2696"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2697","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2697"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/krb5/krb5/commit/e04f0283516e80d2f93366e0d479d13c9b5c8c2a","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/krb5/krb5/commit/e04f0283516e80d2f93366e0d479d13c9b5c8c2a"},{"reference_url":"http://www.debian.org/security/2015/dsa-3395","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3395"},{"reference_url":"http://www.securityfocus.com/bid/90675","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/90675"},{"reference_url":"http://www.securitytracker.com/id/1034084","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034084"},{"reference_url":"http://www.ubuntu.com/usn/USN-2810-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2810-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1275869","reference_id":"1275869","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1275869"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=803084","reference_id":"803084","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=803084"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-2696","reference_id":"CVE-2015-2696","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-2696"},{"reference_url":"https://security.gentoo.org/glsa/201611-14","reference_id":"GLSA-201611-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201611-14"},{"reference_url":"https://usn.ubuntu.com/2810-1/","reference_id":"USN-2810-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2810-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926450?format=json","purl":"pkg:deb/debian/krb5@1.13.2%2Bdfsg-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.13.2%252Bdfsg-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2015-2696"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q2tg-s1kk-4bhc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84016?format=json","vulnerability_id":"VCID-qcva-cb6c-wyds","summary":"krb5: Automatic sec context deletion could lead to double-free","references":[{"reference_url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598","reference_id":"","reference_type":"","scores":[],"url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11462.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11462.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-11462","reference_id":"","reference_type":"","scores":[{"value":"0.01055","scoring_system":"epss","scoring_elements":"0.77528","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01055","scoring_system":"epss","scoring_elements":"0.77675","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01055","scoring_system":"epss","scoring_elements":"0.7759","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01055","scoring_system":"epss","scoring_elements":"0.77628","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01055","scoring_system":"epss","scoring_elements":"0.77626","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01055","scoring_system":"epss","scoring_elements":"0.77621","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01055","scoring_system":"epss","scoring_elements":"0.77652","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01055","scoring_system":"epss","scoring_elements":"0.77659","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01055","scoring_system":"epss","scoring_elements":"0.77533","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01055","scoring_system":"epss","scoring_elements":"0.77559","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01055","scoring_system":"epss","scoring_elements":"0.77541","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01055","scoring_system":"epss","scoring_elements":"0.77571","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01055","scoring_system":"epss","scoring_elements":"0.7758","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01055","scoring_system":"epss","scoring_elements":"0.77607","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01055","scoring_system":"epss","scoring_elements":"0.77591","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-11462"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:P/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1488873","reference_id":"1488873","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1488873"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873563","reference_id":"873563","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873563"},{"reference_url":"https://security.archlinux.org/ASA-201710-8","reference_id":"ASA-201710-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-8"},{"reference_url":"https://security.archlinux.org/ASA-201710-9","reference_id":"ASA-201710-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-9"},{"reference_url":"https://security.archlinux.org/AVG-414","reference_id":"AVG-414","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-414"},{"reference_url":"https://security.archlinux.org/AVG-415","reference_id":"AVG-415","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-415"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.14.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.14.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.14.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.14.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.14.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:alpha1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.14:alpha1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:alpha1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.14:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.14:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.15.1:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.15.1:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.15.1:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.15.1:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.15.1:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.15.1:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:26:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:26:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:26:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-11462","reference_id":"CVE-2017-11462","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-11462"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926456?format=json","purl":"pkg:deb/debian/krb5@1.15.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.15.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2017-11462"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qcva-cb6c-wyds"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62437?format=json","vulnerability_id":"VCID-qdte-3pqp-17at","summary":"Multiple vulnerabilities have been found in MIT Kerberos 5, the\n    most severe of which may allow remote execution of arbitrary code.","references":[{"reference_url":"http://kb.vmware.com/kb/1035108","reference_id":"","reference_type":"","scores":[],"url":"http://kb.vmware.com/kb/1035108"},{"reference_url":"http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051976.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051976.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051999.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051999.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html"},{"reference_url":"http://lists.vmware.com/pipermail/security-announce/2011/000133.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.vmware.com/pipermail/security-announce/2011/000133.html"},{"reference_url":"http://marc.info/?l=bugtraq&m=129562442714657&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=129562442714657&w=2"},{"reference_url":"http://osvdb.org/69609","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/69609"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1324.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1324.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1324","reference_id":"","reference_type":"","scores":[{"value":"0.03499","scoring_system":"epss","scoring_elements":"0.87639","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03499","scoring_system":"epss","scoring_elements":"0.8764","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03499","scoring_system":"epss","scoring_elements":"0.87549","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03499","scoring_system":"epss","scoring_elements":"0.87558","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03499","scoring_system":"epss","scoring_elements":"0.87571","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03499","scoring_system":"epss","scoring_elements":"0.87574","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03499","scoring_system":"epss","scoring_elements":"0.87593","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03499","scoring_system":"epss","scoring_elements":"0.87599","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03499","scoring_system":"epss","scoring_elements":"0.8761","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03499","scoring_system":"epss","scoring_elements":"0.87606","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03499","scoring_system":"epss","scoring_elements":"0.87603","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03499","scoring_system":"epss","scoring_elements":"0.87618","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03499","scoring_system":"epss","scoring_elements":"0.87616","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03499","scoring_system":"epss","scoring_elements":"0.87634","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1324"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1324","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1324"},{"reference_url":"http://secunia.com/advisories/42399","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42399"},{"reference_url":"http://secunia.com/advisories/43015","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43015"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11936","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11936"},{"reference_url":"http://support.apple.com/kb/HT4581","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4581"},{"reference_url":"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt","reference_id":"","reference_type":"","scores":[],"url":"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:246","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:246"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0925.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0925.html"},{"reference_url":"http://www.securityfocus.com/archive/1/514953/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/514953/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/517739/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/517739/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/45116","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/45116"},{"reference_url":"http://www.securitytracker.com/id?1024803","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1024803"},{"reference_url":"http://www.ubuntu.com/usn/USN-1030-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1030-1"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2011-0007.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2011-0007.html"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3094","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3094"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3095","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3095"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3118","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3118"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0187","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0187"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605553","reference_id":"605553","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605553"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=648674","reference_id":"648674","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=648674"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-1324","reference_id":"CVE-2010-1324","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"},{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-1324"},{"reference_url":"https://security.gentoo.org/glsa/201201-13","reference_id":"GLSA-201201-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0925","reference_id":"RHSA-2010:0925","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0925"},{"reference_url":"https://usn.ubuntu.com/1030-1/","reference_id":"USN-1030-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1030-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926428?format=json","purl":"pkg:deb/debian/krb5@1.8.3%2Bdfsg-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.8.3%252Bdfsg-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2010-1324"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qdte-3pqp-17at"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48776?format=json","vulnerability_id":"VCID-qq4w-brbc-8fab","summary":"Multiple vulnerabilities in MIT Kerberos 5 might allow remote\n    unauthenticated users to execute arbitrary code with root privileges.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0846.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0846.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0846","reference_id":"","reference_type":"","scores":[{"value":"0.50005","scoring_system":"epss","scoring_elements":"0.97835","published_at":"2026-04-29T12:55:00Z"},{"value":"0.50005","scoring_system":"epss","scoring_elements":"0.97823","published_at":"2026-04-13T12:55:00Z"},{"value":"0.50005","scoring_system":"epss","scoring_elements":"0.97829","published_at":"2026-04-26T12:55:00Z"},{"value":"0.50005","scoring_system":"epss","scoring_elements":"0.97832","published_at":"2026-04-18T12:55:00Z"},{"value":"0.50005","scoring_system":"epss","scoring_elements":"0.9783","published_at":"2026-04-21T12:55:00Z"},{"value":"0.50005","scoring_system":"epss","scoring_elements":"0.97828","published_at":"2026-04-24T12:55:00Z"},{"value":"0.50005","scoring_system":"epss","scoring_elements":"0.97817","published_at":"2026-04-09T12:55:00Z"},{"value":"0.50005","scoring_system":"epss","scoring_elements":"0.97819","published_at":"2026-04-11T12:55:00Z"},{"value":"0.50005","scoring_system":"epss","scoring_elements":"0.97821","published_at":"2026-04-12T12:55:00Z"},{"value":"0.56355","scoring_system":"epss","scoring_elements":"0.98101","published_at":"2026-04-02T12:55:00Z"},{"value":"0.56355","scoring_system":"epss","scoring_elements":"0.98104","published_at":"2026-04-04T12:55:00Z"},{"value":"0.56355","scoring_system":"epss","scoring_elements":"0.98105","published_at":"2026-04-07T12:55:00Z"},{"value":"0.56355","scoring_system":"epss","scoring_elements":"0.98109","published_at":"2026-04-08T12:55:00Z"},{"value":"0.56355","scoring_system":"epss","scoring_elements":"0.98097","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0846"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0846","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0846"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=491036","reference_id":"491036","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=491036"},{"reference_url":"https://security.gentoo.org/glsa/200904-09","reference_id":"GLSA-200904-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200904-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0408","reference_id":"RHSA-2009:0408","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0408"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0409","reference_id":"RHSA-2009:0409","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0409"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0410","reference_id":"RHSA-2009:0410","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0410"},{"reference_url":"https://usn.ubuntu.com/755-1/","reference_id":"USN-755-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/755-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926419?format=json","purl":"pkg:deb/debian/krb5@1.6.dfsg.4~beta1-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.6.dfsg.4~beta1-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2009-0846"],"risk_score":0.2,"exploitability":"0.5","weighted_severity":"0.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qq4w-brbc-8fab"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41391?format=json","vulnerability_id":"VCID-qzt5-fxf1-huff","summary":"Multiple vulnerabilities have been discovered in MIT Kerberos 5,\n    allowing execution of arbitrary code or Denial of Service.","references":[{"reference_url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=7637","reference_id":"","reference_type":"","scores":[],"url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=7637"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105879.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105879.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105978.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105978.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106698.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106698.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-07/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-07/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-07/msg00007.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-07/msg00007.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-0942.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-0942.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-2443.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-2443.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2002-2443","reference_id":"","reference_type":"","scores":[{"value":"0.15013","scoring_system":"epss","scoring_elements":"0.94592","published_at":"2026-04-29T12:55:00Z"},{"value":"0.15013","scoring_system":"epss","scoring_elements":"0.9453","published_at":"2026-04-01T12:55:00Z"},{"value":"0.15013","scoring_system":"epss","scoring_elements":"0.94538","published_at":"2026-04-02T12:55:00Z"},{"value":"0.15013","scoring_system":"epss","scoring_elements":"0.94545","published_at":"2026-04-04T12:55:00Z"},{"value":"0.15013","scoring_system":"epss","scoring_elements":"0.94548","published_at":"2026-04-07T12:55:00Z"},{"value":"0.15013","scoring_system":"epss","scoring_elements":"0.94558","published_at":"2026-04-08T12:55:00Z"},{"value":"0.15013","scoring_system":"epss","scoring_elements":"0.94562","published_at":"2026-04-09T12:55:00Z"},{"value":"0.15013","scoring_system":"epss","scoring_elements":"0.94565","published_at":"2026-04-11T12:55:00Z"},{"value":"0.15013","scoring_system":"epss","scoring_elements":"0.94568","published_at":"2026-04-13T12:55:00Z"},{"value":"0.15013","scoring_system":"epss","scoring_elements":"0.94581","published_at":"2026-04-16T12:55:00Z"},{"value":"0.15013","scoring_system":"epss","scoring_elements":"0.94585","published_at":"2026-04-18T12:55:00Z"},{"value":"0.15013","scoring_system":"epss","scoring_elements":"0.94589","published_at":"2026-04-21T12:55:00Z"},{"value":"0.15013","scoring_system":"epss","scoring_elements":"0.94591","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2002-2443"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2443","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2443"},{"reference_url":"https://github.com/krb5/krb5/commit/cf1a0c411b2668c57c41e9c4efd15ba17b6b322c","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/krb5/krb5/commit/cf1a0c411b2668c57c41e9c4efd15ba17b6b322c"},{"reference_url":"http://www.debian.org/security/2013/dsa-2701","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2701"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:166","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:166"},{"reference_url":"http://www.ubuntu.com/usn/USN-2810-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2810-1"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=708267","reference_id":"708267","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=708267"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=962531","reference_id":"962531","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=962531"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2002-2443","reference_id":"CVE-2002-2443","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2002-2443"},{"reference_url":"https://security.gentoo.org/glsa/201312-12","reference_id":"GLSA-201312-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201312-12"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0942","reference_id":"RHSA-2013:0942","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0942"},{"reference_url":"https://usn.ubuntu.com/2810-1/","reference_id":"USN-2810-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2810-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926399?format=json","purl":"pkg:deb/debian/krb5@1.10.1%2Bdfsg-6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2002-2443"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qzt5-fxf1-huff"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62429?format=json","vulnerability_id":"VCID-r1jf-pd4n-53dr","summary":"Multiple vulnerabilities have been found in MIT Kerberos 5, the\n    most severe of which may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3295.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3295.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3295","reference_id":"","reference_type":"","scores":[{"value":"0.02737","scoring_system":"epss","scoring_elements":"0.85907","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02737","scoring_system":"epss","scoring_elements":"0.85919","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02737","scoring_system":"epss","scoring_elements":"0.85935","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02737","scoring_system":"epss","scoring_elements":"0.85937","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02737","scoring_system":"epss","scoring_elements":"0.85956","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02737","scoring_system":"epss","scoring_elements":"0.85966","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02737","scoring_system":"epss","scoring_elements":"0.85981","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02737","scoring_system":"epss","scoring_elements":"0.85979","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02737","scoring_system":"epss","scoring_elements":"0.85974","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02737","scoring_system":"epss","scoring_elements":"0.85992","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02737","scoring_system":"epss","scoring_elements":"0.85996","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02737","scoring_system":"epss","scoring_elements":"0.85988","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02737","scoring_system":"epss","scoring_elements":"0.86007","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02737","scoring_system":"epss","scoring_elements":"0.86017","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3295"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=545002","reference_id":"545002","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=545002"},{"reference_url":"https://security.gentoo.org/glsa/201201-13","reference_id":"GLSA-201201-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-13"},{"reference_url":"https://usn.ubuntu.com/879-1/","reference_id":"USN-879-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/879-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926420?format=json","purl":"pkg:deb/debian/krb5@1.7%2Bdfsg-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.7%252Bdfsg-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2009-3295"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r1jf-pd4n-53dr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83860?format=json","vulnerability_id":"VCID-r1wa-3gtw-1qey","summary":"krb5: Buffer overflow in get_matching_data()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15088.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15088.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15088","reference_id":"","reference_type":"","scores":[{"value":"0.03704","scoring_system":"epss","scoring_elements":"0.87996","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03704","scoring_system":"epss","scoring_elements":"0.8795","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03704","scoring_system":"epss","scoring_elements":"0.87957","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03704","scoring_system":"epss","scoring_elements":"0.87968","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03704","scoring_system":"epss","scoring_elements":"0.8796","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03704","scoring_system":"epss","scoring_elements":"0.87959","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03704","scoring_system":"epss","scoring_elements":"0.87973","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03704","scoring_system":"epss","scoring_elements":"0.87972","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03704","scoring_system":"epss","scoring_elements":"0.87989","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03704","scoring_system":"epss","scoring_elements":"0.8793","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0399","scoring_system":"epss","scoring_elements":"0.88364","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0399","scoring_system":"epss","scoring_elements":"0.88356","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0399","scoring_system":"epss","scoring_elements":"0.88379","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15088"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15088","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15088"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:C/I:C/A:C"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4"},{"reference_url":"https://github.com/krb5/krb5/pull/707","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/krb5/krb5/pull/707"},{"reference_url":"http://www.securityfocus.com/bid/101594","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/101594"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1504045","reference_id":"1504045","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1504045"},{"reference_url":"https://security.archlinux.org/AVG-505","reference_id":"AVG-505","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-505"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15088","reference_id":"CVE-2017-15088","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15088"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926457?format=json","purl":"pkg:deb/debian/krb5@1.15.2-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.15.2-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2017-15088"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r1wa-3gtw-1qey"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49818?format=json","vulnerability_id":"VCID-rmt9-dmmb-kkec","summary":"A vulnerability has been found in MIT Kerberos 5, possibly\n    resulting in arbitrary code execution or a Denial of Service condition.","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0345.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0345.html"},{"reference_url":"http://aix.software.ibm.com/aix/efixes/security/nas_advisory1.asc","reference_id":"","reference_type":"","scores":[],"url":"http://aix.software.ibm.com/aix/efixes/security/nas_advisory1.asc"},{"reference_url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=7949","reference_id":"","reference_type":"","scores":[],"url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=7949"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136360.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136360.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0439.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-0439.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4341.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4341.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-4341","reference_id":"","reference_type":"","scores":[{"value":"0.14451","scoring_system":"epss","scoring_elements":"0.94456","published_at":"2026-04-29T12:55:00Z"},{"value":"0.14451","scoring_system":"epss","scoring_elements":"0.94457","published_at":"2026-04-26T12:55:00Z"},{"value":"0.14451","scoring_system":"epss","scoring_elements":"0.94396","published_at":"2026-04-01T12:55:00Z"},{"value":"0.14451","scoring_system":"epss","scoring_elements":"0.94403","published_at":"2026-04-02T12:55:00Z"},{"value":"0.14451","scoring_system":"epss","scoring_elements":"0.94415","published_at":"2026-04-04T12:55:00Z"},{"value":"0.14451","scoring_system":"epss","scoring_elements":"0.94417","published_at":"2026-04-07T12:55:00Z"},{"value":"0.14451","scoring_system":"epss","scoring_elements":"0.94427","published_at":"2026-04-08T12:55:00Z"},{"value":"0.14451","scoring_system":"epss","scoring_elements":"0.9443","published_at":"2026-04-09T12:55:00Z"},{"value":"0.14451","scoring_system":"epss","scoring_elements":"0.94433","published_at":"2026-04-11T12:55:00Z"},{"value":"0.14451","scoring_system":"epss","scoring_elements":"0.94435","published_at":"2026-04-13T12:55:00Z"},{"value":"0.14451","scoring_system":"epss","scoring_elements":"0.9445","published_at":"2026-04-16T12:55:00Z"},{"value":"0.14451","scoring_system":"epss","scoring_elements":"0.94454","published_at":"2026-04-18T12:55:00Z"},{"value":"0.14451","scoring_system":"epss","scoring_elements":"0.94458","published_at":"2026-04-21T12:55:00Z"},{"value":"0.14451","scoring_system":"epss","scoring_elements":"0.94459","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-4341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4342","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4342"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4343","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4343"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4344","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4344"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345"},{"reference_url":"http://secunia.com/advisories/59102","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59102"},{"reference_url":"http://secunia.com/advisories/60082","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60082"},{"reference_url":"http://secunia.com/advisories/60448","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60448"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201412-53.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201412-53.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/94904","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/94904"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/krb5/krb5/commit/e6ae703ae597d798e310368d52b8f38ee11c6a73","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/krb5/krb5/commit/e6ae703ae597d798e310368d52b8f38ee11c6a73"},{"reference_url":"http://www.debian.org/security/2014/dsa-3000","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3000"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:165","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:165"},{"reference_url":"http://www.securityfocus.com/bid/68909","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/68909"},{"reference_url":"http://www.securitytracker.com/id/1030706","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030706"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1116180","reference_id":"1116180","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1116180"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=753624","reference_id":"753624","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=753624"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_tus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_tus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_tus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_tus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_tus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_tus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_tus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_tus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_tus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-4341","reference_id":"CVE-2014-4341","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-4341"},{"reference_url":"https://security.gentoo.org/glsa/201412-53","reference_id":"GLSA-201412-53","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-53"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1245","reference_id":"RHSA-2014:1245","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1245"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1389","reference_id":"RHSA-2014:1389","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1389"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0439","reference_id":"RHSA-2015:0439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0439"},{"reference_url":"https://usn.ubuntu.com/2310-1/","reference_id":"USN-2310-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2310-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926442?format=json","purl":"pkg:deb/debian/krb5@1.12.1%2Bdfsg-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2014-4341"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rmt9-dmmb-kkec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51589?format=json","vulnerability_id":"VCID-rpxk-f19y-87dq","summary":"Multiple vulnerabilities have been discovered in MIT Kerberos 5,\n    the worst of which may allow remote attackers to cause Denial of Service.","references":[{"reference_url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=8244","reference_id":"","reference_type":"","scores":[],"url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=8244"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00007.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00007.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2695.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2695.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2695","reference_id":"","reference_type":"","scores":[{"value":"0.0539","scoring_system":"epss","scoring_elements":"0.90148","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0539","scoring_system":"epss","scoring_elements":"0.9015","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0539","scoring_system":"epss","scoring_elements":"0.90078","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0539","scoring_system":"epss","scoring_elements":"0.90081","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0539","scoring_system":"epss","scoring_elements":"0.90093","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0539","scoring_system":"epss","scoring_elements":"0.90097","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0539","scoring_system":"epss","scoring_elements":"0.90113","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0539","scoring_system":"epss","scoring_elements":"0.90119","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0539","scoring_system":"epss","scoring_elements":"0.90128","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0539","scoring_system":"epss","scoring_elements":"0.90126","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0539","scoring_system":"epss","scoring_elements":"0.90121","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0539","scoring_system":"epss","scoring_elements":"0.90138","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0539","scoring_system":"epss","scoring_elements":"0.90135","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2695"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2695","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2695"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2696","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2696"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2697","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2697"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/krb5/krb5/commit/b51b33f2bc5d1497ddf5bd107f791c101695000d","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/krb5/krb5/commit/b51b33f2bc5d1497ddf5bd107f791c101695000d"},{"reference_url":"http://www.debian.org/security/2015/dsa-3395","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3395"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.securityfocus.com/bid/90687","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/90687"},{"reference_url":"http://www.securitytracker.com/id/1034084","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034084"},{"reference_url":"http://www.ubuntu.com/usn/USN-2810-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2810-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1275871","reference_id":"1275871","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1275871"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=803083","reference_id":"803083","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=803083"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-2695","reference_id":"CVE-2015-2695","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-2695"},{"reference_url":"https://security.gentoo.org/glsa/201611-14","reference_id":"GLSA-201611-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201611-14"},{"reference_url":"https://usn.ubuntu.com/2810-1/","reference_id":"USN-2810-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2810-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926450?format=json","purl":"pkg:deb/debian/krb5@1.13.2%2Bdfsg-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.13.2%252Bdfsg-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2015-2695"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rpxk-f19y-87dq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88651?format=json","vulnerability_id":"VCID-sazf-9s2b-d3a2","summary":"krb5 incomplete fix for CVE-2007-3999","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4743.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4743.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4743","reference_id":"","reference_type":"","scores":[{"value":"0.19637","scoring_system":"epss","scoring_elements":"0.95385","published_at":"2026-04-01T12:55:00Z"},{"value":"0.19637","scoring_system":"epss","scoring_elements":"0.95394","published_at":"2026-04-02T12:55:00Z"},{"value":"0.19637","scoring_system":"epss","scoring_elements":"0.954","published_at":"2026-04-04T12:55:00Z"},{"value":"0.19637","scoring_system":"epss","scoring_elements":"0.95403","published_at":"2026-04-07T12:55:00Z"},{"value":"0.19637","scoring_system":"epss","scoring_elements":"0.9541","published_at":"2026-04-08T12:55:00Z"},{"value":"0.19637","scoring_system":"epss","scoring_elements":"0.95413","published_at":"2026-04-09T12:55:00Z"},{"value":"0.19637","scoring_system":"epss","scoring_elements":"0.95418","published_at":"2026-04-12T12:55:00Z"},{"value":"0.19637","scoring_system":"epss","scoring_elements":"0.9542","published_at":"2026-04-13T12:55:00Z"},{"value":"0.19637","scoring_system":"epss","scoring_elements":"0.95428","published_at":"2026-04-16T12:55:00Z"},{"value":"0.19637","scoring_system":"epss","scoring_elements":"0.95432","published_at":"2026-04-18T12:55:00Z"},{"value":"0.19637","scoring_system":"epss","scoring_elements":"0.95436","published_at":"2026-04-24T12:55:00Z"},{"value":"0.20249","scoring_system":"epss","scoring_elements":"0.95527","published_at":"2026-04-26T12:55:00Z"},{"value":"0.20249","scoring_system":"epss","scoring_elements":"0.95528","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4743"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=281561","reference_id":"281561","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=281561"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=441209","reference_id":"441209","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=441209"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0892","reference_id":"RHSA-2007:0892","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0892"},{"reference_url":"https://usn.ubuntu.com/511-2/","reference_id":"USN-511-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/511-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926415?format=json","purl":"pkg:deb/debian/krb5@1.6.dfsg.1-7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.6.dfsg.1-7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2007-4743"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sazf-9s2b-d3a2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62179?format=json","vulnerability_id":"VCID-sgnn-emh7-kqgh","summary":"security update","references":[{"reference_url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=8343","reference_id":"","reference_type":"","scores":[],"url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=8343"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0493.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0493.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0532.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0532.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8631.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8631.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8631","reference_id":"","reference_type":"","scores":[{"value":"0.0221","scoring_system":"epss","scoring_elements":"0.84521","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0221","scoring_system":"epss","scoring_elements":"0.84508","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0221","scoring_system":"epss","scoring_elements":"0.84517","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0221","scoring_system":"epss","scoring_elements":"0.84384","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0221","scoring_system":"epss","scoring_elements":"0.84399","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0221","scoring_system":"epss","scoring_elements":"0.84419","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0221","scoring_system":"epss","scoring_elements":"0.84422","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0221","scoring_system":"epss","scoring_elements":"0.84443","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0221","scoring_system":"epss","scoring_elements":"0.84448","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0221","scoring_system":"epss","scoring_elements":"0.84467","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0221","scoring_system":"epss","scoring_elements":"0.84461","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0221","scoring_system":"epss","scoring_elements":"0.84456","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0221","scoring_system":"epss","scoring_elements":"0.84478","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0221","scoring_system":"epss","scoring_elements":"0.84479","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0221","scoring_system":"epss","scoring_elements":"0.84481","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8631"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8631","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8631"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:N/I:N/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/krb5/krb5/commit/83ed75feba32e46f736fcce0d96a0445f29b96c2","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/krb5/krb5/commit/83ed75feba32e46f736fcce0d96a0445f29b96c2"},{"reference_url":"http://www.debian.org/security/2016/dsa-3466","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3466"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.securitytracker.com/id/1034916","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034916"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1302642","reference_id":"1302642","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1302642"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813126","reference_id":"813126","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813126"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8631","reference_id":"CVE-2015-8631","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8631"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0493","reference_id":"RHSA-2016:0493","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0493"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0532","reference_id":"RHSA-2016:0532","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0532"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926452?format=json","purl":"pkg:deb/debian/krb5@1.13.2%2Bdfsg-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.13.2%252Bdfsg-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2015-8631"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sgnn-emh7-kqgh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62447?format=json","vulnerability_id":"VCID-sjw9-kv44-8bgv","summary":"Multiple vulnerabilities have been found in MIT Kerberos 5, the\n    most severe of which may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1528.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1528.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1528","reference_id":"","reference_type":"","scores":[{"value":"0.05459","scoring_system":"epss","scoring_elements":"0.90147","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05459","scoring_system":"epss","scoring_elements":"0.9015","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05459","scoring_system":"epss","scoring_elements":"0.90162","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05459","scoring_system":"epss","scoring_elements":"0.90167","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05459","scoring_system":"epss","scoring_elements":"0.90183","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05459","scoring_system":"epss","scoring_elements":"0.90188","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05459","scoring_system":"epss","scoring_elements":"0.90197","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05459","scoring_system":"epss","scoring_elements":"0.90196","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05459","scoring_system":"epss","scoring_elements":"0.90191","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05459","scoring_system":"epss","scoring_elements":"0.90209","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05459","scoring_system":"epss","scoring_elements":"0.90206","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05459","scoring_system":"epss","scoring_elements":"0.9022","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05459","scoring_system":"epss","scoring_elements":"0.90219","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05459","scoring_system":"epss","scoring_elements":"0.90216","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1528"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1528","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1528"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646367","reference_id":"646367","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646367"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=737711","reference_id":"737711","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=737711"},{"reference_url":"https://security.gentoo.org/glsa/201201-13","reference_id":"GLSA-201201-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1379","reference_id":"RHSA-2011:1379","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1379"},{"reference_url":"https://usn.ubuntu.com/1233-1/","reference_id":"USN-1233-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1233-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926432?format=json","purl":"pkg:deb/debian/krb5@1.10%2Bdfsg~alpha1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10%252Bdfsg~alpha1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2011-1528"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sjw9-kv44-8bgv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34396?format=json","vulnerability_id":"VCID-snhh-2g48-xqck","summary":"Two vulnerabilities have been found in MIT Kerberos 5, which could allow a\n    remote unauthenticated user to execute arbitrary code with root privileges.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4000.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4000.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4000","reference_id":"","reference_type":"","scores":[{"value":"0.23834","scoring_system":"epss","scoring_elements":"0.95979","published_at":"2026-04-01T12:55:00Z"},{"value":"0.23834","scoring_system":"epss","scoring_elements":"0.95986","published_at":"2026-04-02T12:55:00Z"},{"value":"0.23834","scoring_system":"epss","scoring_elements":"0.95993","published_at":"2026-04-04T12:55:00Z"},{"value":"0.23834","scoring_system":"epss","scoring_elements":"0.95998","published_at":"2026-04-07T12:55:00Z"},{"value":"0.23834","scoring_system":"epss","scoring_elements":"0.96007","published_at":"2026-04-08T12:55:00Z"},{"value":"0.23834","scoring_system":"epss","scoring_elements":"0.9601","published_at":"2026-04-09T12:55:00Z"},{"value":"0.23834","scoring_system":"epss","scoring_elements":"0.96014","published_at":"2026-04-11T12:55:00Z"},{"value":"0.23834","scoring_system":"epss","scoring_elements":"0.96013","published_at":"2026-04-12T12:55:00Z"},{"value":"0.23834","scoring_system":"epss","scoring_elements":"0.96016","published_at":"2026-04-13T12:55:00Z"},{"value":"0.23834","scoring_system":"epss","scoring_elements":"0.96025","published_at":"2026-04-16T12:55:00Z"},{"value":"0.23834","scoring_system":"epss","scoring_elements":"0.96031","published_at":"2026-04-18T12:55:00Z"},{"value":"0.23834","scoring_system":"epss","scoring_elements":"0.96032","published_at":"2026-04-21T12:55:00Z"},{"value":"0.24528","scoring_system":"epss","scoring_elements":"0.96137","published_at":"2026-04-24T12:55:00Z"},{"value":"0.24528","scoring_system":"epss","scoring_elements":"0.96139","published_at":"2026-04-26T12:55:00Z"},{"value":"0.24528","scoring_system":"epss","scoring_elements":"0.9614","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4000"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4000"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=250976","reference_id":"250976","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=250976"},{"reference_url":"https://security.gentoo.org/glsa/200709-01","reference_id":"GLSA-200709-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200709-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0858","reference_id":"RHSA-2007:0858","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0858"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926415?format=json","purl":"pkg:deb/debian/krb5@1.6.dfsg.1-7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.6.dfsg.1-7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2007-4000"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-snhh-2g48-xqck"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46311?format=json","vulnerability_id":"VCID-t445-ybb2-gkgz","summary":"Multiple vulnerabilities have been found in MIT Kerberos 5, which could\n    allow a remote unauthenticated user to execute arbitrary code with root\n    privileges.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5901.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5901.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5901","reference_id":"","reference_type":"","scores":[{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29529","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29596","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29645","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29467","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.2953","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29568","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.2957","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29525","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29473","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29492","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29464","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29419","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29303","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.2919","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29124","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5901"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5901","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5901"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=415321","reference_id":"415321","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=415321"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454974","reference_id":"454974","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454974"},{"reference_url":"https://security.gentoo.org/glsa/200803-31","reference_id":"GLSA-200803-31","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200803-31"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0164","reference_id":"RHSA-2008:0164","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0164"},{"reference_url":"https://usn.ubuntu.com/924-1/","reference_id":"USN-924-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/924-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926416?format=json","purl":"pkg:deb/debian/krb5@1.6.dfsg.4~beta1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.6.dfsg.4~beta1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2007-5901"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t445-ybb2-gkgz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89036?format=json","vulnerability_id":"VCID-tg9g-rr7p-4ue4","summary":"security flaw","references":[{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20050703-01-U.asc","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20050703-01-U.asc"},{"reference_url":"http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html"},{"reference_url":"http://marc.info/?l=bugtraq&m=112122123211974&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=112122123211974&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-1174.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-1174.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-1174","reference_id":"","reference_type":"","scores":[{"value":"0.40925","scoring_system":"epss","scoring_elements":"0.97392","published_at":"2026-04-29T12:55:00Z"},{"value":"0.40925","scoring_system":"epss","scoring_elements":"0.97353","published_at":"2026-04-01T12:55:00Z"},{"value":"0.40925","scoring_system":"epss","scoring_elements":"0.97358","published_at":"2026-04-02T12:55:00Z"},{"value":"0.40925","scoring_system":"epss","scoring_elements":"0.97362","published_at":"2026-04-04T12:55:00Z"},{"value":"0.40925","scoring_system":"epss","scoring_elements":"0.97363","published_at":"2026-04-07T12:55:00Z"},{"value":"0.40925","scoring_system":"epss","scoring_elements":"0.9737","published_at":"2026-04-08T12:55:00Z"},{"value":"0.40925","scoring_system":"epss","scoring_elements":"0.97371","published_at":"2026-04-09T12:55:00Z"},{"value":"0.40925","scoring_system":"epss","scoring_elements":"0.97373","published_at":"2026-04-11T12:55:00Z"},{"value":"0.40925","scoring_system":"epss","scoring_elements":"0.97374","published_at":"2026-04-12T12:55:00Z"},{"value":"0.40925","scoring_system":"epss","scoring_elements":"0.97375","published_at":"2026-04-13T12:55:00Z"},{"value":"0.40925","scoring_system":"epss","scoring_elements":"0.97382","published_at":"2026-04-16T12:55:00Z"},{"value":"0.40925","scoring_system":"epss","scoring_elements":"0.97385","published_at":"2026-04-21T12:55:00Z"},{"value":"0.40925","scoring_system":"epss","scoring_elements":"0.97386","published_at":"2026-04-24T12:55:00Z"},{"value":"0.40925","scoring_system":"epss","scoring_elements":"0.97388","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-1174"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1174","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1174"},{"reference_url":"http://secunia.com/advisories/16041","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/16041"},{"reference_url":"http://secunia.com/advisories/17899","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17899"},{"reference_url":"http://secunia.com/advisories/20364","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/20364"},{"reference_url":"http://securitytracker.com/id?1014460","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1014460"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/21327","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/21327"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10229","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10229"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A397","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A397"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-101809-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-101809-1"},{"reference_url":"http://web.mit.edu/kerberos/advisories/2005-002-patch_1.4.1.txt","reference_id":"","reference_type":"","scores":[],"url":"http://web.mit.edu/kerberos/advisories/2005-002-patch_1.4.1.txt"},{"reference_url":"http://www-1.ibm.com/support/docview.wss?uid=swg1IY85474","reference_id":"","reference_type":"","scores":[],"url":"http://www-1.ibm.com/support/docview.wss?uid=swg1IY85474"},{"reference_url":"http://www.debian.org/security/2005/dsa-757","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-757"},{"reference_url":"http://www.kb.cert.org/vuls/id/259798","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/259798"},{"reference_url":"http://www.novell.com/linux/security/advisories/2005_17_sr.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2005_17_sr.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-567.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-567.html"},{"reference_url":"http://www.securityfocus.com/bid/14240","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/14240"},{"reference_url":"http://www.trustix.org/errata/2005/0036","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2005/0036"},{"reference_url":"http://www.turbolinux.com/security/2005/TLSA-2005-78.txt","reference_id":"","reference_type":"","scores":[],"url":"http://www.turbolinux.com/security/2005/TLSA-2005-78.txt"},{"reference_url":"http://www.vupen.com/english/advisories/2005/1066","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2005/1066"},{"reference_url":"http://www.vupen.com/english/advisories/2006/2074","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2006/2074"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617613","reference_id":"1617613","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617613"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=318437","reference_id":"318437","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=318437"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-1174","reference_id":"CVE-2005-1174","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-1174"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:567","reference_id":"RHSA-2005:567","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:567"},{"reference_url":"https://usn.ubuntu.com/224-1/","reference_id":"USN-224-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/224-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926410?format=json","purl":"pkg:deb/debian/krb5@1.3.6-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.3.6-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2005-1174"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tg9g-rr7p-4ue4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41395?format=json","vulnerability_id":"VCID-tsuu-f1qk-jygu","summary":"Multiple vulnerabilities have been discovered in MIT Kerberos 5,\n    allowing execution of arbitrary code or Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1417.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1417.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1417","reference_id":"","reference_type":"","scores":[{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67633","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67669","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.6769","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.6767","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67722","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67736","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.6776","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67745","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67712","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67747","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67741","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67761","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67772","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67774","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1417"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1417","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1417"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1030743","reference_id":"1030743","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1030743"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=730085","reference_id":"730085","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=730085"},{"reference_url":"https://security.gentoo.org/glsa/201312-12","reference_id":"GLSA-201312-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201312-12"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926441?format=json","purl":"pkg:deb/debian/krb5@1.11.3%2Bdfsg-3%2Bnmu1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.11.3%252Bdfsg-3%252Bnmu1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2013-1417"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tsuu-f1qk-jygu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57882?format=json","vulnerability_id":"VCID-u9bx-kfz1-nbcq","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9421.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9421.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9421","reference_id":"","reference_type":"","scores":[{"value":"0.05356","scoring_system":"epss","scoring_elements":"0.9011","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05356","scoring_system":"epss","scoring_elements":"0.90038","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05356","scoring_system":"epss","scoring_elements":"0.90041","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05356","scoring_system":"epss","scoring_elements":"0.90052","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05356","scoring_system":"epss","scoring_elements":"0.90057","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05356","scoring_system":"epss","scoring_elements":"0.90072","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05356","scoring_system":"epss","scoring_elements":"0.90078","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05356","scoring_system":"epss","scoring_elements":"0.90087","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05356","scoring_system":"epss","scoring_elements":"0.90085","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05356","scoring_system":"epss","scoring_elements":"0.90079","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05356","scoring_system":"epss","scoring_elements":"0.90096","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05356","scoring_system":"epss","scoring_elements":"0.90097","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05356","scoring_system":"epss","scoring_elements":"0.90094","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05356","scoring_system":"epss","scoring_elements":"0.90112","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9421"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5352","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5352"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9421"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9422","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9422"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9423","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9423"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1179857","reference_id":"1179857","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1179857"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0439","reference_id":"RHSA-2015:0439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0794","reference_id":"RHSA-2015:0794","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0794"},{"reference_url":"https://usn.ubuntu.com/2498-1/","reference_id":"USN-2498-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2498-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926446?format=json","purl":"pkg:deb/debian/krb5@1.12.1%2Bdfsg-17?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-17%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2014-9421"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u9bx-kfz1-nbcq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33935?format=json","vulnerability_id":"VCID-unvx-tsxw-abbw","summary":"A boundary error in Heimdal could result in execution of arbitrary\n    code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4862.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4862.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4862","reference_id":"","reference_type":"","scores":[{"value":"0.92585","scoring_system":"epss","scoring_elements":"0.9974","published_at":"2026-04-04T12:55:00Z"},{"value":"0.92585","scoring_system":"epss","scoring_elements":"0.99742","published_at":"2026-04-13T12:55:00Z"},{"value":"0.92585","scoring_system":"epss","scoring_elements":"0.99743","published_at":"2026-04-16T12:55:00Z"},{"value":"0.92585","scoring_system":"epss","scoring_elements":"0.99744","published_at":"2026-04-18T12:55:00Z"},{"value":"0.92585","scoring_system":"epss","scoring_elements":"0.99745","published_at":"2026-04-21T12:55:00Z"},{"value":"0.92585","scoring_system":"epss","scoring_elements":"0.99747","published_at":"2026-04-26T12:55:00Z"},{"value":"0.92585","scoring_system":"epss","scoring_elements":"0.99748","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4862"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=770325","reference_id":"770325","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=770325"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd/remote/18369.rb","reference_id":"CVE-2011-4862;OSVDB-78020","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd/remote/18369.rb"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/18280.c","reference_id":"CVE-2011-4862;OSVDB-78020","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/18280.c"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/18368.rb","reference_id":"CVE-2011-4862;OSVDB-78020","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/18368.rb"},{"reference_url":"https://security.gentoo.org/glsa/201201-14","reference_id":"GLSA-201201-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-14"},{"reference_url":"https://security.gentoo.org/glsa/201202-05","reference_id":"GLSA-201202-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201202-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1851","reference_id":"RHSA-2011:1851","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1851"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1852","reference_id":"RHSA-2011:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1852"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1853","reference_id":"RHSA-2011:1853","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1853"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1854","reference_id":"RHSA-2011:1854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1854"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926434?format=json","purl":"pkg:deb/debian/krb5@1.8%2Bdfsg~aa%2Br23527-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.8%252Bdfsg~aa%252Br23527-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2011-4862"],"risk_score":1.6,"exploitability":"2.0","weighted_severity":"0.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-unvx-tsxw-abbw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89038?format=json","vulnerability_id":"VCID-upe1-2c47-rycn","summary":"security flaw","references":[{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20050703-01-U.asc","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20050703-01-U.asc"},{"reference_url":"http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000993","reference_id":"","reference_type":"","scores":[],"url":"http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000993"},{"reference_url":"http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html"},{"reference_url":"http://marc.info/?l=bugtraq&m=112119974704542&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=112119974704542&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-1689.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-1689.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-1689","reference_id":"","reference_type":"","scores":[{"value":"0.55203","scoring_system":"epss","scoring_elements":"0.98071","published_at":"2026-04-29T12:55:00Z"},{"value":"0.55203","scoring_system":"epss","scoring_elements":"0.98066","published_at":"2026-04-24T12:55:00Z"},{"value":"0.55203","scoring_system":"epss","scoring_elements":"0.98068","published_at":"2026-04-26T12:55:00Z"},{"value":"0.55203","scoring_system":"epss","scoring_elements":"0.98044","published_at":"2026-04-01T12:55:00Z"},{"value":"0.55203","scoring_system":"epss","scoring_elements":"0.9805","published_at":"2026-04-02T12:55:00Z"},{"value":"0.55203","scoring_system":"epss","scoring_elements":"0.98052","published_at":"2026-04-04T12:55:00Z"},{"value":"0.55203","scoring_system":"epss","scoring_elements":"0.98053","published_at":"2026-04-07T12:55:00Z"},{"value":"0.55203","scoring_system":"epss","scoring_elements":"0.98058","published_at":"2026-04-08T12:55:00Z"},{"value":"0.55203","scoring_system":"epss","scoring_elements":"0.98059","published_at":"2026-04-09T12:55:00Z"},{"value":"0.55203","scoring_system":"epss","scoring_elements":"0.98064","published_at":"2026-04-13T12:55:00Z"},{"value":"0.55203","scoring_system":"epss","scoring_elements":"0.9807","published_at":"2026-04-18T12:55:00Z"},{"value":"0.55203","scoring_system":"epss","scoring_elements":"0.98067","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-1689"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1689","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1689"},{"reference_url":"http://secunia.com/advisories/16041","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/16041"},{"reference_url":"http://secunia.com/advisories/17135","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17135"},{"reference_url":"http://secunia.com/advisories/17899","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17899"},{"reference_url":"http://secunia.com/advisories/22090","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/22090"},{"reference_url":"http://securitytracker.com/id?1014461","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1014461"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/21055","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/21055"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9819","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9819"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-101810-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-101810-1"},{"reference_url":"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-003-recvauth.txt","reference_id":"","reference_type":"","scores":[],"url":"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-003-recvauth.txt"},{"reference_url":"http://www.debian.org/security/2005/dsa-757","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-757"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200507-11.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200507-11.xml"},{"reference_url":"http://www.kb.cert.org/vuls/id/623332","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/623332"},{"reference_url":"http://www.novell.com/linux/security/advisories/2005_17_sr.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2005_17_sr.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-562.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-562.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-567.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-567.html"},{"reference_url":"http://www.securityfocus.com/archive/1/446940/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/446940/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/14239","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/14239"},{"reference_url":"http://www.trustix.org/errata/2005/0036","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2005/0036"},{"reference_url":"http://www.turbolinux.com/security/2005/TLSA-2005-78.txt","reference_id":"","reference_type":"","scores":[],"url":"http://www.turbolinux.com/security/2005/TLSA-2005-78.txt"},{"reference_url":"http://www.vupen.com/english/advisories/2005/1066","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2005/1066"},{"reference_url":"http://www.vupen.com/english/advisories/2006/3776","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2006/3776"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617659","reference_id":"1617659","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617659"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-1689","reference_id":"CVE-2005-1689","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-1689"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:562","reference_id":"RHSA-2005:562","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:562"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:567","reference_id":"RHSA-2005:567","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:567"},{"reference_url":"https://usn.ubuntu.com/224-1/","reference_id":"USN-224-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/224-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926410?format=json","purl":"pkg:deb/debian/krb5@1.3.6-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.3.6-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2005-1689"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-upe1-2c47-rycn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82041?format=json","vulnerability_id":"VCID-upt3-3nj7-3uft","summary":"krb5: reversed strlcpy() allows client to crash the KDC","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14844.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14844.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-14844","reference_id":"","reference_type":"","scores":[{"value":"0.11696","scoring_system":"epss","scoring_elements":"0.93645","published_at":"2026-04-01T12:55:00Z"},{"value":"0.11696","scoring_system":"epss","scoring_elements":"0.9371","published_at":"2026-04-29T12:55:00Z"},{"value":"0.11696","scoring_system":"epss","scoring_elements":"0.93709","published_at":"2026-04-21T12:55:00Z"},{"value":"0.11696","scoring_system":"epss","scoring_elements":"0.93714","published_at":"2026-04-24T12:55:00Z"},{"value":"0.11696","scoring_system":"epss","scoring_elements":"0.93711","published_at":"2026-04-26T12:55:00Z"},{"value":"0.11696","scoring_system":"epss","scoring_elements":"0.93656","published_at":"2026-04-02T12:55:00Z"},{"value":"0.11696","scoring_system":"epss","scoring_elements":"0.93665","published_at":"2026-04-04T12:55:00Z"},{"value":"0.11696","scoring_system":"epss","scoring_elements":"0.93666","published_at":"2026-04-07T12:55:00Z"},{"value":"0.11696","scoring_system":"epss","scoring_elements":"0.93675","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11696","scoring_system":"epss","scoring_elements":"0.93677","published_at":"2026-04-09T12:55:00Z"},{"value":"0.11696","scoring_system":"epss","scoring_elements":"0.93681","published_at":"2026-04-12T12:55:00Z"},{"value":"0.11696","scoring_system":"epss","scoring_elements":"0.93682","published_at":"2026-04-13T12:55:00Z"},{"value":"0.11696","scoring_system":"epss","scoring_elements":"0.937","published_at":"2026-04-16T12:55:00Z"},{"value":"0.11696","scoring_system":"epss","scoring_elements":"0.93706","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-14844"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14844","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14844"},{"reference_url":"https://github.com/krb5/krb5/pull/981","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/krb5/krb5/pull/981"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/54ZYKEJZ77BXZWGF4NEVKC33ESVROEYC/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/54ZYKEJZ77BXZWGF4NEVKC33ESVROEYC/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N4LS5PIJOCNOUZGLO2OBT6GY334PUOSW/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N4LS5PIJOCNOUZGLO2OBT6GY334PUOSW/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TDE2QOKK4I4TV4WV74ZQWICZ4HJN2MOK/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TDE2QOKK4I4TV4WV74ZQWICZ4HJN2MOK/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220325-0003/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20220325-0003/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1753589","reference_id":"1753589","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1753589"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-14844","reference_id":"CVE-2019-14844","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-14844"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926401?format=json","purl":"pkg:deb/debian/krb5@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2019-14844"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-upt3-3nj7-3uft"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48775?format=json","vulnerability_id":"VCID-v61z-w8nz-87bv","summary":"Multiple vulnerabilities in MIT Kerberos 5 might allow remote\n    unauthenticated users to execute arbitrary code with root privileges.","references":[{"reference_url":"http://krbdev.mit.edu/rt/Ticket/Display.html?user=guest&pass=guest&id=6402","reference_id":"","reference_type":"","scores":[],"url":"http://krbdev.mit.edu/rt/Ticket/Display.html?user=guest&pass=guest&id=6402"},{"reference_url":"http://lists.apple.com/archives/security-announce/2009/May/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2009/May/msg00002.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0845.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0845.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0845","reference_id":"","reference_type":"","scores":[{"value":"0.19309","scoring_system":"epss","scoring_elements":"0.95388","published_at":"2026-04-29T12:55:00Z"},{"value":"0.19309","scoring_system":"epss","scoring_elements":"0.95333","published_at":"2026-04-01T12:55:00Z"},{"value":"0.19309","scoring_system":"epss","scoring_elements":"0.95343","published_at":"2026-04-02T12:55:00Z"},{"value":"0.19309","scoring_system":"epss","scoring_elements":"0.95349","published_at":"2026-04-04T12:55:00Z"},{"value":"0.19309","scoring_system":"epss","scoring_elements":"0.95354","published_at":"2026-04-07T12:55:00Z"},{"value":"0.19309","scoring_system":"epss","scoring_elements":"0.95361","published_at":"2026-04-08T12:55:00Z"},{"value":"0.19309","scoring_system":"epss","scoring_elements":"0.95364","published_at":"2026-04-09T12:55:00Z"},{"value":"0.19309","scoring_system":"epss","scoring_elements":"0.95368","published_at":"2026-04-12T12:55:00Z"},{"value":"0.19309","scoring_system":"epss","scoring_elements":"0.9537","published_at":"2026-04-13T12:55:00Z"},{"value":"0.19309","scoring_system":"epss","scoring_elements":"0.95377","published_at":"2026-04-16T12:55:00Z"},{"value":"0.19309","scoring_system":"epss","scoring_elements":"0.95381","published_at":"2026-04-18T12:55:00Z"},{"value":"0.19309","scoring_system":"epss","scoring_elements":"0.95384","published_at":"2026-04-24T12:55:00Z"},{"value":"0.19309","scoring_system":"epss","scoring_elements":"0.95387","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0845"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0845","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0845"},{"reference_url":"http://secunia.com/advisories/34347","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34347"},{"reference_url":"http://secunia.com/advisories/34594","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34594"},{"reference_url":"http://secunia.com/advisories/34617","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34617"},{"reference_url":"http://secunia.com/advisories/34622","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34622"},{"reference_url":"http://secunia.com/advisories/34628","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34628"},{"reference_url":"http://secunia.com/advisories/34630","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34630"},{"reference_url":"http://secunia.com/advisories/34637","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34637"},{"reference_url":"http://secunia.com/advisories/34640","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34640"},{"reference_url":"http://secunia.com/advisories/34734","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34734"},{"reference_url":"http://secunia.com/advisories/35074","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35074"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200904-09.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200904-09.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/49448","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/49448"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10044","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10044"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6449","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6449"},{"reference_url":"http://src.mit.edu/fisheye/browse/krb5/trunk/src/lib/gssapi/spnego/spnego_mech.c?r1=21875&r2=22084","reference_id":"","reference_type":"","scores":[],"url":"http://src.mit.edu/fisheye/browse/krb5/trunk/src/lib/gssapi/spnego/spnego_mech.c?r1=21875&r2=22084"},{"reference_url":"http://src.mit.edu/fisheye/changelog/krb5/?cs=22084","reference_id":"","reference_type":"","scores":[],"url":"http://src.mit.edu/fisheye/changelog/krb5/?cs=22084"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-256728-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-256728-1"},{"reference_url":"http://support.apple.com/kb/HT3549","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3549"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2009-142.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2009-142.htm"},{"reference_url":"http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5047180.html","reference_id":"","reference_type":"","scores":[],"url":"http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5047180.html"},{"reference_url":"http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5047181.html","reference_id":"","reference_type":"","scores":[],"url":"http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5047181.html"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00205.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00205.html"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00206.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00206.html"},{"reference_url":"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2009-001.txt","reference_id":"","reference_type":"","scores":[],"url":"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2009-001.txt"},{"reference_url":"http://wiki.rpath.com/Advisories:rPSA-2009-0058","reference_id":"","reference_type":"","scores":[],"url":"http://wiki.rpath.com/Advisories:rPSA-2009-0058"},{"reference_url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0058","reference_id":"","reference_type":"","scores":[],"url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0058"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg21396120","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21396120"},{"reference_url":"http://www.kb.cert.org/vuls/id/662091","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/662091"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:082","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:082"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2009-0408.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2009-0408.html"},{"reference_url":"http://www.securityfocus.com/archive/1/502526/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/502526/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/502546/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/502546/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/34257","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/34257"},{"reference_url":"http://www.securitytracker.com/id?1021867","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1021867"},{"reference_url":"http://www.ubuntu.com/usn/usn-755-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-755-1"},{"reference_url":"http://www.us-cert.gov/cas/techalerts/TA09-133A.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.us-cert.gov/cas/techalerts/TA09-133A.html"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0847","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0847"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0976","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0976"},{"reference_url":"http://www.vupen.com/english/advisories/2009/1057","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/1057"},{"reference_url":"http://www.vupen.com/english/advisories/2009/1106","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/1106"},{"reference_url":"http://www.vupen.com/english/advisories/2009/1297","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/1297"},{"reference_url":"http://www.vupen.com/english/advisories/2009/2248","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/2248"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=490634","reference_id":"490634","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=490634"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.5.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos:5-1.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2009-0845","reference_id":"CVE-2009-0845","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2009-0845"},{"reference_url":"https://security.gentoo.org/glsa/200904-09","reference_id":"GLSA-200904-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200904-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0408","reference_id":"RHSA-2009:0408","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0408"},{"reference_url":"https://usn.ubuntu.com/755-1/","reference_id":"USN-755-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/755-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926419?format=json","purl":"pkg:deb/debian/krb5@1.6.dfsg.4~beta1-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.6.dfsg.4~beta1-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2009-0845"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v61z-w8nz-87bv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49820?format=json","vulnerability_id":"VCID-vr9b-gwxs-fqgg","summary":"A vulnerability has been found in MIT Kerberos 5, possibly\n    resulting in arbitrary code execution or a Denial of Service condition.","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0345.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0345.html"},{"reference_url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705","reference_id":"","reference_type":"","scores":[],"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"},{"reference_url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=7980","reference_id":"","reference_type":"","scores":[],"url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=7980"},{"reference_url":"http://linux.oracle.com/errata/ELSA-2014-1255.html","reference_id":"","reference_type":"","scores":[],"url":"http://linux.oracle.com/errata/ELSA-2014-1255.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136640.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136640.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-August/137056.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-August/137056.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00009.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00009.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-08/msg00030.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-08/msg00030.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1255.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1255.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0439.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-0439.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4345.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4345.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-4345","reference_id":"","reference_type":"","scores":[{"value":"0.11304","scoring_system":"epss","scoring_elements":"0.93562","published_at":"2026-04-29T12:55:00Z"},{"value":"0.11304","scoring_system":"epss","scoring_elements":"0.93564","published_at":"2026-04-26T12:55:00Z"},{"value":"0.11304","scoring_system":"epss","scoring_elements":"0.93495","published_at":"2026-04-01T12:55:00Z"},{"value":"0.11304","scoring_system":"epss","scoring_elements":"0.93504","published_at":"2026-04-02T12:55:00Z"},{"value":"0.11304","scoring_system":"epss","scoring_elements":"0.93512","published_at":"2026-04-07T12:55:00Z"},{"value":"0.11304","scoring_system":"epss","scoring_elements":"0.9352","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11304","scoring_system":"epss","scoring_elements":"0.93523","published_at":"2026-04-09T12:55:00Z"},{"value":"0.11304","scoring_system":"epss","scoring_elements":"0.93528","published_at":"2026-04-13T12:55:00Z"},{"value":"0.11304","scoring_system":"epss","scoring_elements":"0.93547","published_at":"2026-04-16T12:55:00Z"},{"value":"0.11304","scoring_system":"epss","scoring_elements":"0.93553","published_at":"2026-04-18T12:55:00Z"},{"value":"0.11304","scoring_system":"epss","scoring_elements":"0.9356","published_at":"2026-04-21T12:55:00Z"},{"value":"0.11304","scoring_system":"epss","scoring_elements":"0.93565","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-4345"},{"reference_url":"https://blogs.oracle.com/sunsecurity/entry/cve_2014_4345_numeric_errors","reference_id":"","reference_type":"","scores":[],"url":"https://blogs.oracle.com/sunsecurity/entry/cve_2014_4345_numeric_errors"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4342","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4342"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4343","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4343"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4344","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4344"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345"},{"reference_url":"http://secunia.com/advisories/59102","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59102"},{"reference_url":"http://secunia.com/advisories/59415","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59415"},{"reference_url":"http://secunia.com/advisories/59993","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59993"},{"reference_url":"http://secunia.com/advisories/60535","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60535"},{"reference_url":"http://secunia.com/advisories/60776","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60776"},{"reference_url":"http://secunia.com/advisories/61314","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61314"},{"reference_url":"http://secunia.com/advisories/61353","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61353"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201412-53.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201412-53.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/95212","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/95212"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/krb5/krb5/commit/dc7ed55c689d57de7f7408b34631bf06fec9dab1","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/krb5/krb5/commit/dc7ed55c689d57de7f7408b34631bf06fec9dab1"},{"reference_url":"https://github.com/krb5/krb5/pull/181","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/krb5/krb5/pull/181"},{"reference_url":"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2014-001.txt","reference_id":"","reference_type":"","scores":[],"url":"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2014-001.txt"},{"reference_url":"http://www.debian.org/security/2014/dsa-3000","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3000"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:165","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:165"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"},{"reference_url":"http://www.osvdb.org/109908","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/109908"},{"reference_url":"http://www.securityfocus.com/bid/69168","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/69168"},{"reference_url":"http://www.securitytracker.com/id/1030705","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030705"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1128157","reference_id":"1128157","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1128157"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757416","reference_id":"757416","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757416"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.11.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.9.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.9.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-4345","reference_id":"CVE-2014-4345","reference_type":"","scores":[{"value":"8.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-4345"},{"reference_url":"https://security.gentoo.org/glsa/201412-53","reference_id":"GLSA-201412-53","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-53"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1255","reference_id":"RHSA-2014:1255","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1255"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1389","reference_id":"RHSA-2014:1389","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1389"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0439","reference_id":"RHSA-2015:0439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0439"},{"reference_url":"https://usn.ubuntu.com/2310-1/","reference_id":"USN-2310-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2310-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926444?format=json","purl":"pkg:deb/debian/krb5@1.12.1%2Bdfsg-7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2014-4345"],"risk_score":3.9,"exploitability":"0.5","weighted_severity":"7.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vr9b-gwxs-fqgg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62443?format=json","vulnerability_id":"VCID-w4vk-xwxf-kqdy","summary":"Multiple vulnerabilities have been found in MIT Kerberos 5, the\n    most severe of which may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0283.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0283.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0283","reference_id":"","reference_type":"","scores":[{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.78","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77857","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77864","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77891","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77874","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77901","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77906","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77933","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77916","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77954","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77953","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77946","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77979","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77987","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0283"},{"reference_url":"http://secunia.com/advisories/43260","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43260"},{"reference_url":"http://securityreason.com/securityalert/8073","reference_id":"","reference_type":"","scores":[],"url":"http://securityreason.com/securityalert/8073"},{"reference_url":"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-002.txt","reference_id":"","reference_type":"","scores":[],"url":"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-002.txt"},{"reference_url":"http://www.securityfocus.com/archive/1/516299/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/516299/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/46272","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/46272"},{"reference_url":"http://www.securitytracker.com/id?1025037","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1025037"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0330","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0330"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=670567","reference_id":"670567","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=670567"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-0283","reference_id":"CVE-2011-0283","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-0283"},{"reference_url":"https://security.gentoo.org/glsa/201201-13","reference_id":"GLSA-201201-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-13"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926401?format=json","purl":"pkg:deb/debian/krb5@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2011-0283"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w4vk-xwxf-kqdy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/75053?format=json","vulnerability_id":"VCID-w6yc-w573-vbhy","summary":"krb5: GSS message token handling","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-37370.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-37370.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-37370","reference_id":"","reference_type":"","scores":[{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67837","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67807","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67773","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67809","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67803","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67822","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67832","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67731","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67751","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67732","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67783","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67797","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67821","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-37370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37371","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37371"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2294677","reference_id":"2294677","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2294677"},{"reference_url":"https://github.com/krb5/krb5/commit/55fbf435edbe2e92dd8101669b1ce7144bc96fef","reference_id":"55fbf435edbe2e92dd8101669b1ce7144bc96fef","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-01T15:25:49Z/"}],"url":"https://github.com/krb5/krb5/commit/55fbf435edbe2e92dd8101669b1ce7144bc96fef"},{"reference_url":"https://web.mit.edu/kerberos/www/advisories/","reference_id":"advisories","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-01T15:25:49Z/"}],"url":"https://web.mit.edu/kerberos/www/advisories/"},{"reference_url":"https://security.archlinux.org/AVG-2856","reference_id":"AVG-2856","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2856"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10135","reference_id":"RHSA-2024:10135","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11109","reference_id":"RHSA-2024:11109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4734","reference_id":"RHSA-2024:4734","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4734"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4743","reference_id":"RHSA-2024:4743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4743"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5076","reference_id":"RHSA-2024:5076","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5076"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5312","reference_id":"RHSA-2024:5312","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5312"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5316","reference_id":"RHSA-2024:5316","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5316"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5625","reference_id":"RHSA-2024:5625","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5625"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5630","reference_id":"RHSA-2024:5630","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5630"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5643","reference_id":"RHSA-2024:5643","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5643"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5884","reference_id":"RHSA-2024:5884","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5884"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6166","reference_id":"RHSA-2024:6166","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7213","reference_id":"RHSA-2024:7213","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7213"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7374","reference_id":"RHSA-2024:7374","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7374"},{"reference_url":"https://usn.ubuntu.com/6947-1/","reference_id":"USN-6947-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6947-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926471?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926470?format=json","purl":"pkg:deb/debian/krb5@1.21.3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2024-37370"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w6yc-w573-vbhy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46317?format=json","vulnerability_id":"VCID-wfcj-74db-tfg6","summary":"Multiple vulnerabilities have been found in MIT Kerberos 5, which could\n    allow a remote unauthenticated user to execute arbitrary code with root\n    privileges.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0062.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0062.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0062","reference_id":"","reference_type":"","scores":[{"value":"0.16257","scoring_system":"epss","scoring_elements":"0.9479","published_at":"2026-04-01T12:55:00Z"},{"value":"0.16257","scoring_system":"epss","scoring_elements":"0.948","published_at":"2026-04-02T12:55:00Z"},{"value":"0.16257","scoring_system":"epss","scoring_elements":"0.94803","published_at":"2026-04-04T12:55:00Z"},{"value":"0.16257","scoring_system":"epss","scoring_elements":"0.94805","published_at":"2026-04-07T12:55:00Z"},{"value":"0.16257","scoring_system":"epss","scoring_elements":"0.94814","published_at":"2026-04-08T12:55:00Z"},{"value":"0.16257","scoring_system":"epss","scoring_elements":"0.94818","published_at":"2026-04-09T12:55:00Z"},{"value":"0.16257","scoring_system":"epss","scoring_elements":"0.94822","published_at":"2026-04-11T12:55:00Z"},{"value":"0.16257","scoring_system":"epss","scoring_elements":"0.94826","published_at":"2026-04-12T12:55:00Z"},{"value":"0.16257","scoring_system":"epss","scoring_elements":"0.94827","published_at":"2026-04-13T12:55:00Z"},{"value":"0.16257","scoring_system":"epss","scoring_elements":"0.94833","published_at":"2026-04-16T12:55:00Z"},{"value":"0.16257","scoring_system":"epss","scoring_elements":"0.94836","published_at":"2026-04-18T12:55:00Z"},{"value":"0.16257","scoring_system":"epss","scoring_elements":"0.9484","published_at":"2026-04-21T12:55:00Z"},{"value":"0.16257","scoring_system":"epss","scoring_elements":"0.94842","published_at":"2026-04-26T12:55:00Z"},{"value":"0.16257","scoring_system":"epss","scoring_elements":"0.94843","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0062"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0062","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0062"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=432620","reference_id":"432620","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=432620"},{"reference_url":"https://security.gentoo.org/glsa/200803-31","reference_id":"GLSA-200803-31","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200803-31"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0164","reference_id":"RHSA-2008:0164","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0180","reference_id":"RHSA-2008:0180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0181","reference_id":"RHSA-2008:0181","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0181"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0182","reference_id":"RHSA-2008:0182","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0182"},{"reference_url":"https://usn.ubuntu.com/587-1/","reference_id":"USN-587-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/587-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926417?format=json","purl":"pkg:deb/debian/krb5@1.6.dfsg.3~beta1-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.6.dfsg.3~beta1-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2008-0062"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wfcj-74db-tfg6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89764?format=json","vulnerability_id":"VCID-wm5m-9fdb-9qex","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0041.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0041.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2003-0041","reference_id":"","reference_type":"","scores":[{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79095","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79102","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79128","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79114","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79138","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79146","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79171","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79155","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79172","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.7917","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79168","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79202","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79209","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79225","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2003-0041"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1616943","reference_id":"1616943","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1616943"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:020","reference_id":"RHSA-2003:020","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:020"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:021","reference_id":"RHSA-2003:021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:168","reference_id":"RHSA-2003:168","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:168"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926401?format=json","purl":"pkg:deb/debian/krb5@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2003-0041"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wm5m-9fdb-9qex"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62449?format=json","vulnerability_id":"VCID-wng4-f8sk-kqg9","summary":"Multiple vulnerabilities have been found in MIT Kerberos 5, the\n    most severe of which may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1530.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1530.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1530","reference_id":"","reference_type":"","scores":[{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.7609","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76093","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76125","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76104","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76137","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.7615","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76176","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76152","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76149","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.7619","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76194","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76177","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76217","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76227","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76239","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1530"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1530","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1530"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=753748","reference_id":"753748","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=753748"},{"reference_url":"https://security.gentoo.org/glsa/201201-13","reference_id":"GLSA-201201-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1790","reference_id":"RHSA-2011:1790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1790"},{"reference_url":"https://usn.ubuntu.com/1290-1/","reference_id":"USN-1290-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1290-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926433?format=json","purl":"pkg:deb/debian/krb5@1.10%2Bdfsg~alpha1-7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10%252Bdfsg~alpha1-7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2011-1530"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wng4-f8sk-kqg9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40313?format=json","vulnerability_id":"VCID-ype9-agj3-dbfr","summary":"Multiple vulnerabilities in MIT Kerberos 5 could potentially result in\n    unauthenticated remote root code execution.","references":[{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20070401-01-P.asc","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20070401-01-P.asc"},{"reference_url":"http://lists.suse.com/archive/suse-security-announce/2007-Apr/0001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.suse.com/archive/suse-security-announce/2007-Apr/0001.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0956.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0956.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-0956","reference_id":"","reference_type":"","scores":[{"value":"0.21911","scoring_system":"epss","scoring_elements":"0.9578","published_at":"2026-04-29T12:55:00Z"},{"value":"0.21911","scoring_system":"epss","scoring_elements":"0.95728","published_at":"2026-04-01T12:55:00Z"},{"value":"0.21911","scoring_system":"epss","scoring_elements":"0.95737","published_at":"2026-04-02T12:55:00Z"},{"value":"0.21911","scoring_system":"epss","scoring_elements":"0.95745","published_at":"2026-04-04T12:55:00Z"},{"value":"0.21911","scoring_system":"epss","scoring_elements":"0.95748","published_at":"2026-04-07T12:55:00Z"},{"value":"0.21911","scoring_system":"epss","scoring_elements":"0.95756","published_at":"2026-04-08T12:55:00Z"},{"value":"0.21911","scoring_system":"epss","scoring_elements":"0.9576","published_at":"2026-04-09T12:55:00Z"},{"value":"0.21911","scoring_system":"epss","scoring_elements":"0.95763","published_at":"2026-04-12T12:55:00Z"},{"value":"0.21911","scoring_system":"epss","scoring_elements":"0.95764","published_at":"2026-04-13T12:55:00Z"},{"value":"0.21911","scoring_system":"epss","scoring_elements":"0.95773","published_at":"2026-04-16T12:55:00Z"},{"value":"0.21911","scoring_system":"epss","scoring_elements":"0.95777","published_at":"2026-04-18T12:55:00Z"},{"value":"0.21911","scoring_system":"epss","scoring_elements":"0.95779","published_at":"2026-04-21T12:55:00Z"},{"value":"0.21911","scoring_system":"epss","scoring_elements":"0.95781","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-0956"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0956","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0956"},{"reference_url":"http://secunia.com/advisories/24706","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24706"},{"reference_url":"http://secunia.com/advisories/24735","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24735"},{"reference_url":"http://secunia.com/advisories/24736","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24736"},{"reference_url":"http://secunia.com/advisories/24740","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24740"},{"reference_url":"http://secunia.com/advisories/24750","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24750"},{"reference_url":"http://secunia.com/advisories/24755","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24755"},{"reference_url":"http://secunia.com/advisories/24757","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24757"},{"reference_url":"http://secunia.com/advisories/24785","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24785"},{"reference_url":"http://secunia.com/advisories/24786","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24786"},{"reference_url":"http://secunia.com/advisories/24817","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24817"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200704-02.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200704-02.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/33414","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/33414"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10046","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10046"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102867-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102867-1"},{"reference_url":"http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-001-telnetd.txt","reference_id":"","reference_type":"","scores":[],"url":"http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-001-telnetd.txt"},{"reference_url":"http://www.debian.org/security/2007/dsa-1276","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2007/dsa-1276"},{"reference_url":"http://www.kb.cert.org/vuls/id/220816","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/220816"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:077","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:077"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0095.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0095.html"},{"reference_url":"http://www.securityfocus.com/archive/1/464590/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/464590/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/464666/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/464666/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/464814/30/7170/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/464814/30/7170/threaded"},{"reference_url":"http://www.securityfocus.com/bid/23281","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/23281"},{"reference_url":"http://www.securitytracker.com/id?1017848","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1017848"},{"reference_url":"http://www.ubuntu.com/usn/usn-449-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-449-1"},{"reference_url":"http://www.us-cert.gov/cas/techalerts/TA07-093B.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.us-cert.gov/cas/techalerts/TA07-093B.html"},{"reference_url":"http://www.vupen.com/english/advisories/2007/1218","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/1218"},{"reference_url":"http://www.vupen.com/english/advisories/2007/1249","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/1249"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=229782","reference_id":"229782","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=229782"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-0956","reference_id":"CVE-2007-0956","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-0956"},{"reference_url":"https://security.gentoo.org/glsa/200704-02","reference_id":"GLSA-200704-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200704-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0095","reference_id":"RHSA-2007:0095","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0095"},{"reference_url":"https://usn.ubuntu.com/449-1/","reference_id":"USN-449-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/449-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926413?format=json","purl":"pkg:deb/debian/krb5@1.4.4-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.4.4-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2007-0956"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ype9-agj3-dbfr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57847?format=json","vulnerability_id":"VCID-yuur-7md8-skcv","summary":"security update","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0345.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0345.html"},{"reference_url":"http://aix.software.ibm.com/aix/efixes/security/nas_advisory1.asc","reference_id":"","reference_type":"","scores":[],"url":"http://aix.software.ibm.com/aix/efixes/security/nas_advisory1.asc"},{"reference_url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=7970","reference_id":"","reference_type":"","scores":[],"url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=7970"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136360.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136360.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0439.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-0439.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4344.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4344.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-4344","reference_id":"","reference_type":"","scores":[{"value":"0.0527","scoring_system":"epss","scoring_elements":"0.90029","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0527","scoring_system":"epss","scoring_elements":"0.89956","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0527","scoring_system":"epss","scoring_elements":"0.89959","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0527","scoring_system":"epss","scoring_elements":"0.89971","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0527","scoring_system":"epss","scoring_elements":"0.89978","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0527","scoring_system":"epss","scoring_elements":"0.89993","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0527","scoring_system":"epss","scoring_elements":"0.89999","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0527","scoring_system":"epss","scoring_elements":"0.90006","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0527","scoring_system":"epss","scoring_elements":"0.90005","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0527","scoring_system":"epss","scoring_elements":"0.89998","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0527","scoring_system":"epss","scoring_elements":"0.90013","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0527","scoring_system":"epss","scoring_elements":"0.90014","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0527","scoring_system":"epss","scoring_elements":"0.90011","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-4344"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4342","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4342"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4343","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4343"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4344","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4344"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345"},{"reference_url":"http://secunia.com/advisories/59102","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59102"},{"reference_url":"http://secunia.com/advisories/60082","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60082"},{"reference_url":"http://secunia.com/advisories/60448","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60448"},{"reference_url":"http://secunia.com/advisories/61051","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61051"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/95210","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/95210"},{"reference_url":"https://github.com/krb5/krb5/commit/524688ce87a15fc75f87efc8c039ba4c7d5c197b","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/krb5/krb5/commit/524688ce87a15fc75f87efc8c039ba4c7d5c197b"},{"reference_url":"https://github.com/krb5/krb5/commit/a7886f0ed1277c69142b14a2c6629175a6331edc","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/krb5/krb5/commit/a7886f0ed1277c69142b14a2c6629175a6331edc"},{"reference_url":"http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15561.html","reference_id":"","reference_type":"","scores":[],"url":"http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15561.html"},{"reference_url":"http://www.debian.org/security/2014/dsa-3000","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3000"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:165","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:165"},{"reference_url":"http://www.osvdb.org/109389","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/109389"},{"reference_url":"http://www.securityfocus.com/bid/69160","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/69160"},{"reference_url":"http://www.securitytracker.com/id/1030706","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030706"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1121877","reference_id":"1121877","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1121877"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=755521","reference_id":"755521","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=755521"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.11.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-4344","reference_id":"CVE-2014-4344","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-4344"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1245","reference_id":"RHSA-2014:1245","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1245"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1389","reference_id":"RHSA-2014:1389","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1389"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0439","reference_id":"RHSA-2015:0439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0439"},{"reference_url":"https://usn.ubuntu.com/2310-1/","reference_id":"USN-2310-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2310-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926443?format=json","purl":"pkg:deb/debian/krb5@1.12.1%2Bdfsg-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2014-4344"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yuur-7md8-skcv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62448?format=json","vulnerability_id":"VCID-yw2r-vw2q-vffp","summary":"Multiple vulnerabilities have been found in MIT Kerberos 5, the\n    most severe of which may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1529.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1529.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1529","reference_id":"","reference_type":"","scores":[{"value":"0.02376","scoring_system":"epss","scoring_elements":"0.84897","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02376","scoring_system":"epss","scoring_elements":"0.84913","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02376","scoring_system":"epss","scoring_elements":"0.84931","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02376","scoring_system":"epss","scoring_elements":"0.84935","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02376","scoring_system":"epss","scoring_elements":"0.84958","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02376","scoring_system":"epss","scoring_elements":"0.84965","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02376","scoring_system":"epss","scoring_elements":"0.84981","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02376","scoring_system":"epss","scoring_elements":"0.84979","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02376","scoring_system":"epss","scoring_elements":"0.84975","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02376","scoring_system":"epss","scoring_elements":"0.84996","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02376","scoring_system":"epss","scoring_elements":"0.84998","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02376","scoring_system":"epss","scoring_elements":"0.84995","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02376","scoring_system":"epss","scoring_elements":"0.8502","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02376","scoring_system":"epss","scoring_elements":"0.85028","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02376","scoring_system":"epss","scoring_elements":"0.85027","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1529"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1529","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1529"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646367","reference_id":"646367","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646367"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=737711","reference_id":"737711","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=737711"},{"reference_url":"https://security.gentoo.org/glsa/201201-13","reference_id":"GLSA-201201-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1379","reference_id":"RHSA-2011:1379","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1379"},{"reference_url":"https://usn.ubuntu.com/1233-1/","reference_id":"USN-1233-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1233-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926432?format=json","purl":"pkg:deb/debian/krb5@1.10%2Bdfsg~alpha1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10%252Bdfsg~alpha1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2011-1529"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yw2r-vw2q-vffp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85294?format=json","vulnerability_id":"VCID-z6ca-snvn-jyh9","summary":"krb5: null pointer dereference in kadmin","references":[{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-04/msg00007.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-04/msg00007.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-04/msg00055.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-04/msg00055.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2591.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2591.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3119.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3119.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3119","reference_id":"","reference_type":"","scores":[{"value":"0.0915","scoring_system":"epss","scoring_elements":"0.92699","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0915","scoring_system":"epss","scoring_elements":"0.92704","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0915","scoring_system":"epss","scoring_elements":"0.9265","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0915","scoring_system":"epss","scoring_elements":"0.92657","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0915","scoring_system":"epss","scoring_elements":"0.92664","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0915","scoring_system":"epss","scoring_elements":"0.92674","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0915","scoring_system":"epss","scoring_elements":"0.92679","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0915","scoring_system":"epss","scoring_elements":"0.92684","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0915","scoring_system":"epss","scoring_elements":"0.92683","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0915","scoring_system":"epss","scoring_elements":"0.92698","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0915","scoring_system":"epss","scoring_elements":"0.92697","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0915","scoring_system":"epss","scoring_elements":"0.92701","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3119"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3119","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3119"},{"reference_url":"https://github.com/krb5/krb5/commit/08c642c09c38a9c6454ab43a9b53b2a89b9eef99","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/krb5/krb5/commit/08c642c09c38a9c6454ab43a9b53b2a89b9eef99"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html"},{"reference_url":"http://www.securityfocus.com/bid/85392","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/85392"},{"reference_url":"http://www.securitytracker.com/id/1035399","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1035399"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1319616","reference_id":"1319616","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1319616"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=819468","reference_id":"819468","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=819468"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.11.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.13.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.13.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.14.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.14.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:alpha1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.14:alpha1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:alpha1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.14:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.14:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.2.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.2.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.2.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.2:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.2:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3:alpha1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.3:alpha1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3:alpha1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.5.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.9.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.9.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3119","reference_id":"CVE-2016-3119","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:N/I:N/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3119"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2591","reference_id":"RHSA-2016:2591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2591"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926453?format=json","purl":"pkg:deb/debian/krb5@1.14.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.14.2%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2016-3119"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z6ca-snvn-jyh9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62439?format=json","vulnerability_id":"VCID-zm7m-94dv-3bav","summary":"Multiple vulnerabilities have been found in MIT Kerberos 5, the\n    most severe of which may allow remote execution of arbitrary code.","references":[{"reference_url":"http://kb.vmware.com/kb/1035108","reference_id":"","reference_type":"","scores":[],"url":"http://kb.vmware.com/kb/1035108"},{"reference_url":"http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html"},{"reference_url":"http://lists.vmware.com/pipermail/security-announce/2011/000133.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.vmware.com/pipermail/security-announce/2011/000133.html"},{"reference_url":"http://osvdb.org/69607","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/69607"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4021.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4021.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4021","reference_id":"","reference_type":"","scores":[{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64626","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64482","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64535","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64564","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64522","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64571","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64587","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64604","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64591","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64563","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64597","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64609","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64594","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64615","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64628","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4021"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4021","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4021"},{"reference_url":"http://support.apple.com/kb/HT4581","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4581"},{"reference_url":"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt","reference_id":"","reference_type":"","scores":[],"url":"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:246","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:246"},{"reference_url":"http://www.securityfocus.com/archive/1/514953/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/514953/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/517739/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/517739/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/45122","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/45122"},{"reference_url":"http://www.securitytracker.com/id?1024803","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1024803"},{"reference_url":"http://www.ubuntu.com/usn/USN-1030-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1030-1"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2011-0007.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2011-0007.html"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3094","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3094"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3118","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3118"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=648736","reference_id":"648736","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=648736"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4021","reference_id":"CVE-2010-4021","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4021"},{"reference_url":"https://security.gentoo.org/glsa/201201-13","reference_id":"GLSA-201201-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-13"},{"reference_url":"https://usn.ubuntu.com/1030-1/","reference_id":"USN-1030-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1030-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926421?format=json","purl":"pkg:deb/debian/krb5@1.8%2Bdfsg~alpha1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.8%252Bdfsg~alpha1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2010-4021"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zm7m-94dv-3bav"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47299?format=json","vulnerability_id":"VCID-zw66-w86u-cuge","summary":"Multiple vulnerabilities have been discovered in MIT krb5, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-37750","reference_id":"","reference_type":"","scores":[{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72328","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.7246","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72455","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72464","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72333","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72351","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72367","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.7238","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72402","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72386","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72374","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72415","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72425","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72413","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-37750"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1996834","reference_id":"1996834","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1996834"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=992607","reference_id":"992607","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=992607"},{"reference_url":"https://security.archlinux.org/AVG-2312","reference_id":"AVG-2312","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2312"},{"reference_url":"https://security.gentoo.org/glsa/202405-11","reference_id":"GLSA-202405-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3576","reference_id":"RHSA-2021:3576","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3576"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4788","reference_id":"RHSA-2021:4788","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4788"},{"reference_url":"https://usn.ubuntu.com/5959-1/","reference_id":"USN-5959-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5959-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926463?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926462?format=json","purl":"pkg:deb/debian/krb5@1.18.3-7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2021-37750"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zw66-w86u-cuge"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83733?format=json","vulnerability_id":"VCID-zx87-dep4-8bg2","summary":"krb5: null pointer deference in strlen function in plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5710.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5710.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-5710","reference_id":"","reference_type":"","scores":[{"value":"0.00563","scoring_system":"epss","scoring_elements":"0.68308","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00563","scoring_system":"epss","scoring_elements":"0.68328","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00563","scoring_system":"epss","scoring_elements":"0.68347","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00563","scoring_system":"epss","scoring_elements":"0.68324","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00563","scoring_system":"epss","scoring_elements":"0.68375","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00563","scoring_system":"epss","scoring_elements":"0.68392","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00563","scoring_system":"epss","scoring_elements":"0.68419","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00563","scoring_system":"epss","scoring_elements":"0.68406","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00563","scoring_system":"epss","scoring_elements":"0.68373","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00563","scoring_system":"epss","scoring_elements":"0.68411","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00563","scoring_system":"epss","scoring_elements":"0.68425","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00563","scoring_system":"epss","scoring_elements":"0.68403","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00563","scoring_system":"epss","scoring_elements":"0.68451","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00563","scoring_system":"epss","scoring_elements":"0.68456","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00563","scoring_system":"epss","scoring_elements":"0.68461","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-5710"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1535575","reference_id":"1535575","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1535575"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889685","reference_id":"889685","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889685"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926459?format=json","purl":"pkg:deb/debian/krb5@1.16.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.16.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2018-5710"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zx87-dep4-8bg2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85384?format=json","vulnerability_id":"VCID-zxvf-pz4q-myey","summary":"krb5: krb5 doesn't check for null policy when KADM5_POLICY is set in the mask","references":[{"reference_url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=8342","reference_id":"","reference_type":"","scores":[],"url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=8342"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0532.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0532.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8630.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8630.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8630","reference_id":"","reference_type":"","scores":[{"value":"0.03005","scoring_system":"epss","scoring_elements":"0.86614","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03005","scoring_system":"epss","scoring_elements":"0.86607","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03005","scoring_system":"epss","scoring_elements":"0.86615","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03005","scoring_system":"epss","scoring_elements":"0.86516","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03005","scoring_system":"epss","scoring_elements":"0.86527","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03005","scoring_system":"epss","scoring_elements":"0.86545","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03005","scoring_system":"epss","scoring_elements":"0.86564","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03005","scoring_system":"epss","scoring_elements":"0.86574","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03005","scoring_system":"epss","scoring_elements":"0.86588","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03005","scoring_system":"epss","scoring_elements":"0.86585","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03005","scoring_system":"epss","scoring_elements":"0.86578","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03005","scoring_system":"epss","scoring_elements":"0.86591","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03005","scoring_system":"epss","scoring_elements":"0.86596","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8630"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8630","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8630"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/krb5/krb5/commit/b863de7fbf080b15e347a736fdda0a82d42f4f6b","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/krb5/krb5/commit/b863de7fbf080b15e347a736fdda0a82d42f4f6b"},{"reference_url":"http://www.debian.org/security/2016/dsa-3466","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3466"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.securitytracker.com/id/1034915","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034915"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1302632","reference_id":"1302632","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1302632"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813127","reference_id":"813127","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813127"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.12.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.12.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.13.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:alpha1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.14:alpha1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:alpha1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.14:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.14:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8630","reference_id":"CVE-2015-8630","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8630"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0532","reference_id":"RHSA-2016:0532","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0532"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926452?format=json","purl":"pkg:deb/debian/krb5@1.13.2%2Bdfsg-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.13.2%252Bdfsg-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2015-8630"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zxvf-pz4q-myey"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"}