Lookup for vulnerable packages by Package URL.

GET /api/packages/926401?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/926401?format=api",
    "purl": "pkg:deb/debian/krb5@0?distro=trixie",
    "type": "deb",
    "namespace": "debian",
    "name": "krb5",
    "version": "0",
    "qualifiers": {
        "distro": "trixie"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "1.2.4",
    "latest_non_vulnerable_version": "1.22.1-2.1",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48239?format=api",
            "vulnerability_id": "VCID-beex-9vxx-8ua1",
            "summary": "Multiple vulnerabilities in MIT Kerberos 5 could potentially result in the\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "http://fedoranews.org/cms/node/2375",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://fedoranews.org/cms/node/2375"
                },
                {
                    "reference_url": "http://lists.suse.com/archive/suse-security-announce/2007-Jan/0004.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.suse.com/archive/suse-security-announce/2007-Jan/0004.html"
                },
                {
                    "reference_url": "http://osvdb.org/31280",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://osvdb.org/31280"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-6144.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-6144.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-6144",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.21928",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95827",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.21928",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95729",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.21928",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95739",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.21928",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95746",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.21928",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95749",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.21928",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95758",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.21928",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95761",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.21928",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95765",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.21928",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95764",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.21928",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95775",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.21928",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95779",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.21928",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95781",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.21928",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95783",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.21928",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95782",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.21928",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95794",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.21928",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95796",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.21928",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95803",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.21928",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95808",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.21928",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95813",
                            "published_at": "2026-05-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-6144"
                },
                {
                    "reference_url": "http://secunia.com/advisories/23690",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/23690"
                },
                {
                    "reference_url": "http://secunia.com/advisories/23701",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/23701"
                },
                {
                    "reference_url": "http://secunia.com/advisories/23706",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/23706"
                },
                {
                    "reference_url": "http://secunia.com/advisories/23903",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/23903"
                },
                {
                    "reference_url": "http://secunia.com/advisories/35151",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/35151"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-200701-21.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-200701-21.xml"
                },
                {
                    "reference_url": "http://securitytracker.com/id?1017494",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://securitytracker.com/id?1017494"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31417",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31417"
                },
                {
                    "reference_url": "https://issues.rpath.com/browse/RPL-925",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://issues.rpath.com/browse/RPL-925"
                },
                {
                    "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102772-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102772-1"
                },
                {
                    "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-201294-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-201294-1"
                },
                {
                    "reference_url": "http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2006-003-mechglue.txt",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2006-003-mechglue.txt"
                },
                {
                    "reference_url": "http://www.kb.cert.org/vuls/id/831452",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.kb.cert.org/vuls/id/831452"
                },
                {
                    "reference_url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.006.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/456409/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/456409/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/21975",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/21975"
                },
                {
                    "reference_url": "http://www.us-cert.gov/cas/techalerts/TA07-009B.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.us-cert.gov/cas/techalerts/TA07-009B.html"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2007/0111",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2007/0111"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2007/0112",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2007/0112"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2006-6144",
                    "reference_id": "CVE-2006-6144",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-6144"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200701-21",
                    "reference_id": "GLSA-200701-21",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200701-21"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/926401?format=api",
                    "purl": "pkg:deb/debian/krb5@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/926395?format=api",
                    "purl": "pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-8bra-vqyv-ffd8"
                        },
                        {
                            "vulnerability": "VCID-vrxs-u44n-vqax"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/926393?format=api",
                    "purl": "pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-8bra-vqyv-ffd8"
                        },
                        {
                            "vulnerability": "VCID-vrxs-u44n-vqax"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/926397?format=api",
                    "purl": "pkg:deb/debian/krb5@1.21.3-5?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-8bra-vqyv-ffd8"
                        },
                        {
                            "vulnerability": "VCID-vrxs-u44n-vqax"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/926396?format=api",
                    "purl": "pkg:deb/debian/krb5@1.22.1-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-8bra-vqyv-ffd8"
                        },
                        {
                            "vulnerability": "VCID-vrxs-u44n-vqax"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1112539?format=api",
                    "purl": "pkg:deb/debian/krb5@1.22.1-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2.1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2006-6144"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-beex-9vxx-8ua1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77501?format=api",
            "vulnerability_id": "VCID-e827-j3gv-hkau",
            "summary": "krb5: Memory leak at /krb5/src/kdc/ndr.c",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-26462.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-26462.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-26462",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07009",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06753",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06885",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06949",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0695",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06971",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06558",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06595",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06578",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06629",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06672",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06664",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06656",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06648",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06577",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06569",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06726",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06725",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06734",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-26462"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1064965",
                    "reference_id": "1064965",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1064965"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266742",
                    "reference_id": "2266742",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266742"
                },
                {
                    "reference_url": "https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_3.md",
                    "reference_id": "krb5_detect_3.md",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-25T20:04:17Z/"
                        }
                    ],
                    "url": "https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_3.md"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240415-0012/",
                    "reference_id": "ntap-20240415-0012",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-25T20:04:17Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240415-0012/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:9331",
                    "reference_id": "RHSA-2024:9331",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:9331"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7314-1/",
                    "reference_id": "USN-7314-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7314-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/926401?format=api",
                    "purl": "pkg:deb/debian/krb5@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/926395?format=api",
                    "purl": "pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-8bra-vqyv-ffd8"
                        },
                        {
                            "vulnerability": "VCID-vrxs-u44n-vqax"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/926469?format=api",
                    "purl": "pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/926393?format=api",
                    "purl": "pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-8bra-vqyv-ffd8"
                        },
                        {
                            "vulnerability": "VCID-vrxs-u44n-vqax"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/926470?format=api",
                    "purl": "pkg:deb/debian/krb5@1.21.3-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/926397?format=api",
                    "purl": "pkg:deb/debian/krb5@1.21.3-5?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-8bra-vqyv-ffd8"
                        },
                        {
                            "vulnerability": "VCID-vrxs-u44n-vqax"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/926396?format=api",
                    "purl": "pkg:deb/debian/krb5@1.22.1-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-8bra-vqyv-ffd8"
                        },
                        {
                            "vulnerability": "VCID-vrxs-u44n-vqax"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1112539?format=api",
                    "purl": "pkg:deb/debian/krb5@1.22.1-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2.1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-26462"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e827-j3gv-hkau"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84022?format=api",
            "vulnerability_id": "VCID-exb4-v6zx-4qcu",
            "summary": "krb5: Authentication bypass by improper validation of certificate EKU and SAN",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7562.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7562.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7562",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00429",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62385",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00429",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62632",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00429",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62552",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00429",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62577",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00429",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62444",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00429",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62474",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00429",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62441",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00429",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62492",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00429",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62508",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00429",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62527",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00429",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62516",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00429",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62494",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00429",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62536",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00429",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62542",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00429",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62524",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00429",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62534",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00429",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6255",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00429",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62546",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00429",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62495",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00429",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62544",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00429",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62599",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7562"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:S/C:N/I:C/A:N"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1485510",
                    "reference_id": "1485510",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1485510"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0666",
                    "reference_id": "RHSA-2018:0666",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0666"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/926401?format=api",
                    "purl": "pkg:deb/debian/krb5@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/926395?format=api",
                    "purl": "pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-8bra-vqyv-ffd8"
                        },
                        {
                            "vulnerability": "VCID-vrxs-u44n-vqax"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/926393?format=api",
                    "purl": "pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-8bra-vqyv-ffd8"
                        },
                        {
                            "vulnerability": "VCID-vrxs-u44n-vqax"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/926397?format=api",
                    "purl": "pkg:deb/debian/krb5@1.21.3-5?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-8bra-vqyv-ffd8"
                        },
                        {
                            "vulnerability": "VCID-vrxs-u44n-vqax"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/926396?format=api",
                    "purl": "pkg:deb/debian/krb5@1.22.1-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-8bra-vqyv-ffd8"
                        },
                        {
                            "vulnerability": "VCID-vrxs-u44n-vqax"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1112539?format=api",
                    "purl": "pkg:deb/debian/krb5@1.22.1-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2.1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-7562"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-exb4-v6zx-4qcu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47302?format=api",
            "vulnerability_id": "VCID-g1xe-gb5c-vkd8",
            "summary": "Multiple vulnerabilities have been discovered in MIT krb5, the worst of which could lead to remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39975.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39975.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-39975",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79079",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79314",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.01226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79116",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79124",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79148",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79134",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79151",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79149",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79182",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79189",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79206",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79219",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7924",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79256",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.01226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79274",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.01226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79106",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79091",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-39975"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2232682",
                    "reference_id": "2232682",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2232682"
                },
                {
                    "reference_url": "https://github.com/krb5/krb5/commit/88a1701b423c13991a8064feeb26952d3641d840",
                    "reference_id": "88a1701b423c13991a8064feeb26952d3641d840",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-15T05:16:00Z/"
                        }
                    ],
                    "url": "https://github.com/krb5/krb5/commit/88a1701b423c13991a8064feeb26952d3641d840"
                },
                {
                    "reference_url": "https://web.mit.edu/kerberos/www/advisories/",
                    "reference_id": "advisories",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-15T05:16:00Z/"
                        }
                    ],
                    "url": "https://web.mit.edu/kerberos/www/advisories/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-11",
                    "reference_id": "GLSA-202405-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-11"
                },
                {
                    "reference_url": "https://github.com/krb5/krb5/compare/krb5-1.21.1-final...krb5-1.21.2-final",
                    "reference_id": "krb5-1.21.1-final...krb5-1.21.2-final",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-15T05:16:00Z/"
                        }
                    ],
                    "url": "https://github.com/krb5/krb5/compare/krb5-1.21.1-final...krb5-1.21.2-final"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230915-0014/",
                    "reference_id": "ntap-20230915-0014",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-15T05:16:00Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230915-0014/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240201-0005/",
                    "reference_id": "ntap-20240201-0005",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-15T05:16:00Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240201-0005/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240201-0008/",
                    "reference_id": "ntap-20240201-0008",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-15T05:16:00Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240201-0008/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6699",
                    "reference_id": "RHSA-2023:6699",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6699"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/926401?format=api",
                    "purl": "pkg:deb/debian/krb5@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/926395?format=api",
                    "purl": "pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-8bra-vqyv-ffd8"
                        },
                        {
                            "vulnerability": "VCID-vrxs-u44n-vqax"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/926393?format=api",
                    "purl": "pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-8bra-vqyv-ffd8"
                        },
                        {
                            "vulnerability": "VCID-vrxs-u44n-vqax"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/926397?format=api",
                    "purl": "pkg:deb/debian/krb5@1.21.3-5?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-8bra-vqyv-ffd8"
                        },
                        {
                            "vulnerability": "VCID-vrxs-u44n-vqax"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/926396?format=api",
                    "purl": "pkg:deb/debian/krb5@1.22.1-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-8bra-vqyv-ffd8"
                        },
                        {
                            "vulnerability": "VCID-vrxs-u44n-vqax"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1112539?format=api",
                    "purl": "pkg:deb/debian/krb5@1.22.1-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2.1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-39975"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g1xe-gb5c-vkd8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82041?format=api",
            "vulnerability_id": "VCID-upt3-3nj7-3uft",
            "summary": "krb5: reversed strlcpy() allows client to crash the KDC",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14844.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14844.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.11696",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93645",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.11696",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93758",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.11696",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93738",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.11696",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9374",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.11696",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93745",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.11696",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93656",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.11696",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93665",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.11696",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93666",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.11696",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93675",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.11696",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93677",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.11696",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93681",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.11696",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93682",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.11696",
                            "scoring_system": "epss",
                            "scoring_elements": "0.937",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.11696",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93706",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.11696",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93709",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.11696",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93714",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.11696",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93711",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.11696",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9371",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.11696",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93718",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.11696",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93729",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14844"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14844"
                },
                {
                    "reference_url": "https://github.com/krb5/krb5/pull/981",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/krb5/krb5/pull/981"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/54ZYKEJZ77BXZWGF4NEVKC33ESVROEYC/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/54ZYKEJZ77BXZWGF4NEVKC33ESVROEYC/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N4LS5PIJOCNOUZGLO2OBT6GY334PUOSW/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N4LS5PIJOCNOUZGLO2OBT6GY334PUOSW/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TDE2QOKK4I4TV4WV74ZQWICZ4HJN2MOK/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TDE2QOKK4I4TV4WV74ZQWICZ4HJN2MOK/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220325-0003/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20220325-0003/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753589",
                    "reference_id": "1753589",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753589"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14844",
                    "reference_id": "CVE-2019-14844",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14844"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/926401?format=api",
                    "purl": "pkg:deb/debian/krb5@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/926395?format=api",
                    "purl": "pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-8bra-vqyv-ffd8"
                        },
                        {
                            "vulnerability": "VCID-vrxs-u44n-vqax"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/926393?format=api",
                    "purl": "pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-8bra-vqyv-ffd8"
                        },
                        {
                            "vulnerability": "VCID-vrxs-u44n-vqax"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/926397?format=api",
                    "purl": "pkg:deb/debian/krb5@1.21.3-5?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-8bra-vqyv-ffd8"
                        },
                        {
                            "vulnerability": "VCID-vrxs-u44n-vqax"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/926396?format=api",
                    "purl": "pkg:deb/debian/krb5@1.22.1-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-8bra-vqyv-ffd8"
                        },
                        {
                            "vulnerability": "VCID-vrxs-u44n-vqax"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1112539?format=api",
                    "purl": "pkg:deb/debian/krb5@1.22.1-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2.1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2019-14844"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-upt3-3nj7-3uft"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62443?format=api",
            "vulnerability_id": "VCID-w4vk-xwxf-kqdy",
            "summary": "Multiple vulnerabilities have been found in MIT Kerberos 5, the\n    most severe of which may allow remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0283.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0283.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-0283",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78106",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.01087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77857",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77864",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77891",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77874",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77901",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77906",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77933",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77916",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77954",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77953",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77946",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77979",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77987",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78009",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78038",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78055",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.01087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78045",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.01087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78063",
                            "published_at": "2026-05-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-0283"
                },
                {
                    "reference_url": "http://secunia.com/advisories/43260",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/43260"
                },
                {
                    "reference_url": "http://securityreason.com/securityalert/8073",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://securityreason.com/securityalert/8073"
                },
                {
                    "reference_url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-002.txt",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-002.txt"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/516299/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/516299/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/46272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/46272"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1025037",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1025037"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0330",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0330"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=670567",
                    "reference_id": "670567",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=670567"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0283",
                    "reference_id": "CVE-2011-0283",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0283"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201201-13",
                    "reference_id": "GLSA-201201-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201201-13"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/926401?format=api",
                    "purl": "pkg:deb/debian/krb5@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/926395?format=api",
                    "purl": "pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-8bra-vqyv-ffd8"
                        },
                        {
                            "vulnerability": "VCID-vrxs-u44n-vqax"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/926393?format=api",
                    "purl": "pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-8bra-vqyv-ffd8"
                        },
                        {
                            "vulnerability": "VCID-vrxs-u44n-vqax"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/926397?format=api",
                    "purl": "pkg:deb/debian/krb5@1.21.3-5?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-8bra-vqyv-ffd8"
                        },
                        {
                            "vulnerability": "VCID-vrxs-u44n-vqax"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/926396?format=api",
                    "purl": "pkg:deb/debian/krb5@1.22.1-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-8bra-vqyv-ffd8"
                        },
                        {
                            "vulnerability": "VCID-vrxs-u44n-vqax"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1112539?format=api",
                    "purl": "pkg:deb/debian/krb5@1.22.1-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2.1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2011-0283"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w4vk-xwxf-kqdy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89764?format=api",
            "vulnerability_id": "VCID-wm5m-9fdb-9qex",
            "summary": "security flaw",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0041.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0041.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2003-0041",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79095",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79102",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79128",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79114",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79138",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79146",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79171",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79155",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79172",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7917",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79168",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79202",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79209",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79225",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79239",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7926",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79276",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.01228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79294",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.01228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79334",
                            "published_at": "2026-05-14T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2003-0041"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616943",
                    "reference_id": "1616943",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616943"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2003:020",
                    "reference_id": "RHSA-2003:020",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2003:020"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2003:021",
                    "reference_id": "RHSA-2003:021",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2003:021"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2003:168",
                    "reference_id": "RHSA-2003:168",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2003:168"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/926401?format=api",
                    "purl": "pkg:deb/debian/krb5@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/926395?format=api",
                    "purl": "pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-8bra-vqyv-ffd8"
                        },
                        {
                            "vulnerability": "VCID-vrxs-u44n-vqax"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/926393?format=api",
                    "purl": "pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-8bra-vqyv-ffd8"
                        },
                        {
                            "vulnerability": "VCID-vrxs-u44n-vqax"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/926397?format=api",
                    "purl": "pkg:deb/debian/krb5@1.21.3-5?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-8bra-vqyv-ffd8"
                        },
                        {
                            "vulnerability": "VCID-vrxs-u44n-vqax"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/926396?format=api",
                    "purl": "pkg:deb/debian/krb5@1.22.1-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-8bra-vqyv-ffd8"
                        },
                        {
                            "vulnerability": "VCID-vrxs-u44n-vqax"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1112539?format=api",
                    "purl": "pkg:deb/debian/krb5@1.22.1-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2.1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2003-0041"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wm5m-9fdb-9qex"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@0%3Fdistro=trixie"
}