Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/926401?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/926401?format=api", "purl": "pkg:deb/debian/krb5@0?distro=trixie", "type": "deb", "namespace": "debian", "name": "krb5", "version": "0", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "1.2.4", "latest_non_vulnerable_version": "1.22.1-2.1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48239?format=api", "vulnerability_id": "VCID-beex-9vxx-8ua1", "summary": "Multiple vulnerabilities in MIT Kerberos 5 could potentially result in the\n execution of arbitrary code.", "references": [ { "reference_url": "http://fedoranews.org/cms/node/2375", "reference_id": "", "reference_type": "", "scores": [], "url": "http://fedoranews.org/cms/node/2375" }, { "reference_url": "http://lists.suse.com/archive/suse-security-announce/2007-Jan/0004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.suse.com/archive/suse-security-announce/2007-Jan/0004.html" }, { "reference_url": "http://osvdb.org/31280", "reference_id": "", "reference_type": "", "scores": [], "url": "http://osvdb.org/31280" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-6144.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-6144.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-6144", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.21928", "scoring_system": "epss", "scoring_elements": "0.95827", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.21928", "scoring_system": "epss", "scoring_elements": "0.95729", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.21928", "scoring_system": "epss", "scoring_elements": "0.95739", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.21928", "scoring_system": "epss", "scoring_elements": "0.95746", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.21928", "scoring_system": "epss", "scoring_elements": "0.95749", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.21928", "scoring_system": "epss", "scoring_elements": "0.95758", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.21928", "scoring_system": "epss", "scoring_elements": "0.95761", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.21928", "scoring_system": "epss", "scoring_elements": "0.95765", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.21928", "scoring_system": "epss", "scoring_elements": "0.95764", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.21928", "scoring_system": "epss", "scoring_elements": "0.95775", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.21928", "scoring_system": "epss", "scoring_elements": "0.95779", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.21928", "scoring_system": "epss", "scoring_elements": "0.95781", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.21928", "scoring_system": "epss", "scoring_elements": "0.95783", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.21928", "scoring_system": "epss", "scoring_elements": "0.95782", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.21928", "scoring_system": "epss", "scoring_elements": "0.95794", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.21928", "scoring_system": "epss", "scoring_elements": "0.95796", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.21928", "scoring_system": "epss", "scoring_elements": "0.95803", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.21928", "scoring_system": "epss", "scoring_elements": "0.95808", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.21928", "scoring_system": "epss", "scoring_elements": "0.95813", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-6144" }, { "reference_url": "http://secunia.com/advisories/23690", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/23690" }, { "reference_url": "http://secunia.com/advisories/23701", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/23701" }, { "reference_url": "http://secunia.com/advisories/23706", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/23706" }, { "reference_url": "http://secunia.com/advisories/23903", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/23903" }, { "reference_url": "http://secunia.com/advisories/35151", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/35151" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200701-21.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200701-21.xml" }, { "reference_url": "http://securitytracker.com/id?1017494", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1017494" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31417", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31417" }, { "reference_url": "https://issues.rpath.com/browse/RPL-925", "reference_id": "", "reference_type": "", "scores": [], "url": "https://issues.rpath.com/browse/RPL-925" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102772-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102772-1" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-201294-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-201294-1" }, { "reference_url": "http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2006-003-mechglue.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2006-003-mechglue.txt" }, { "reference_url": "http://www.kb.cert.org/vuls/id/831452", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kb.cert.org/vuls/id/831452" }, { "reference_url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.006.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.006.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/456409/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/456409/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/21975", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/21975" }, { "reference_url": "http://www.us-cert.gov/cas/techalerts/TA07-009B.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.us-cert.gov/cas/techalerts/TA07-009B.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/0111", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/0111" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/0112", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/0112" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2006-6144", "reference_id": "CVE-2006-6144", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-6144" }, { "reference_url": "https://security.gentoo.org/glsa/200701-21", "reference_id": "GLSA-200701-21", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200701-21" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/926401?format=api", "purl": "pkg:deb/debian/krb5@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926395?format=api", "purl": "pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-8bra-vqyv-ffd8" }, { "vulnerability": "VCID-vrxs-u44n-vqax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926393?format=api", "purl": "pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-8bra-vqyv-ffd8" }, { "vulnerability": "VCID-vrxs-u44n-vqax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926397?format=api", "purl": "pkg:deb/debian/krb5@1.21.3-5?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-8bra-vqyv-ffd8" }, { "vulnerability": "VCID-vrxs-u44n-vqax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926396?format=api", "purl": "pkg:deb/debian/krb5@1.22.1-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-8bra-vqyv-ffd8" }, { "vulnerability": "VCID-vrxs-u44n-vqax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1112539?format=api", "purl": "pkg:deb/debian/krb5@1.22.1-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2.1%3Fdistro=trixie" } ], "aliases": [ "CVE-2006-6144" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-beex-9vxx-8ua1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77501?format=api", "vulnerability_id": "VCID-e827-j3gv-hkau", "summary": "krb5: Memory leak at /krb5/src/kdc/ndr.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-26462.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-26462.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-26462", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.07009", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06753", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06885", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06949", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.0695", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06971", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06558", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06595", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06578", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06629", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06672", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06664", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06656", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06648", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06577", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06569", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06726", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06725", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06734", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-26462" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1064965", "reference_id": "1064965", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1064965" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266742", "reference_id": "2266742", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266742" }, { "reference_url": "https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_3.md", "reference_id": "krb5_detect_3.md", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-25T20:04:17Z/" } ], "url": "https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_3.md" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240415-0012/", "reference_id": "ntap-20240415-0012", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-25T20:04:17Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240415-0012/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9331", "reference_id": "RHSA-2024:9331", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9331" }, { "reference_url": "https://usn.ubuntu.com/7314-1/", "reference_id": "USN-7314-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7314-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/926401?format=api", "purl": "pkg:deb/debian/krb5@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926395?format=api", "purl": "pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-8bra-vqyv-ffd8" }, { "vulnerability": "VCID-vrxs-u44n-vqax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926469?format=api", "purl": "pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926393?format=api", "purl": "pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-8bra-vqyv-ffd8" }, { "vulnerability": "VCID-vrxs-u44n-vqax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926470?format=api", "purl": "pkg:deb/debian/krb5@1.21.3-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926397?format=api", "purl": "pkg:deb/debian/krb5@1.21.3-5?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-8bra-vqyv-ffd8" }, { "vulnerability": "VCID-vrxs-u44n-vqax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926396?format=api", "purl": "pkg:deb/debian/krb5@1.22.1-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-8bra-vqyv-ffd8" }, { "vulnerability": "VCID-vrxs-u44n-vqax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1112539?format=api", "purl": "pkg:deb/debian/krb5@1.22.1-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2.1%3Fdistro=trixie" } ], "aliases": [ "CVE-2024-26462" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e827-j3gv-hkau" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84022?format=api", "vulnerability_id": "VCID-exb4-v6zx-4qcu", "summary": "krb5: Authentication bypass by improper validation of certificate EKU and SAN", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7562.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7562.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7562", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00429", "scoring_system": "epss", "scoring_elements": "0.62385", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00429", "scoring_system": "epss", "scoring_elements": "0.62632", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00429", "scoring_system": "epss", "scoring_elements": "0.62552", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00429", "scoring_system": "epss", "scoring_elements": "0.62577", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00429", "scoring_system": "epss", "scoring_elements": "0.62444", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00429", "scoring_system": "epss", "scoring_elements": "0.62474", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00429", "scoring_system": "epss", "scoring_elements": "0.62441", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00429", "scoring_system": "epss", "scoring_elements": "0.62492", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00429", "scoring_system": "epss", "scoring_elements": "0.62508", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00429", "scoring_system": "epss", "scoring_elements": "0.62527", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00429", "scoring_system": "epss", "scoring_elements": "0.62516", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00429", "scoring_system": "epss", "scoring_elements": "0.62494", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00429", "scoring_system": "epss", "scoring_elements": "0.62536", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00429", "scoring_system": "epss", "scoring_elements": "0.62542", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00429", "scoring_system": "epss", "scoring_elements": "0.62524", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00429", "scoring_system": "epss", "scoring_elements": "0.62534", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00429", "scoring_system": "epss", "scoring_elements": "0.6255", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00429", "scoring_system": "epss", "scoring_elements": "0.62546", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00429", "scoring_system": "epss", "scoring_elements": "0.62495", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00429", "scoring_system": "epss", "scoring_elements": "0.62544", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00429", "scoring_system": "epss", "scoring_elements": "0.62599", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7562" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:S/C:N/I:C/A:N" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1485510", "reference_id": "1485510", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1485510" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0666", "reference_id": "RHSA-2018:0666", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0666" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/926401?format=api", "purl": "pkg:deb/debian/krb5@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926395?format=api", "purl": "pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-8bra-vqyv-ffd8" }, { "vulnerability": "VCID-vrxs-u44n-vqax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926393?format=api", "purl": "pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-8bra-vqyv-ffd8" }, { "vulnerability": "VCID-vrxs-u44n-vqax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926397?format=api", "purl": "pkg:deb/debian/krb5@1.21.3-5?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-8bra-vqyv-ffd8" }, { "vulnerability": "VCID-vrxs-u44n-vqax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926396?format=api", "purl": "pkg:deb/debian/krb5@1.22.1-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-8bra-vqyv-ffd8" }, { "vulnerability": "VCID-vrxs-u44n-vqax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1112539?format=api", "purl": "pkg:deb/debian/krb5@1.22.1-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2.1%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-7562" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-exb4-v6zx-4qcu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47302?format=api", "vulnerability_id": "VCID-g1xe-gb5c-vkd8", "summary": "Multiple vulnerabilities have been discovered in MIT krb5, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39975.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39975.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-39975", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01226", "scoring_system": "epss", "scoring_elements": "0.79079", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01226", "scoring_system": "epss", "scoring_elements": "0.79314", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.01226", "scoring_system": "epss", "scoring_elements": "0.79116", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01226", "scoring_system": "epss", "scoring_elements": "0.79124", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01226", "scoring_system": "epss", "scoring_elements": "0.79148", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01226", "scoring_system": "epss", "scoring_elements": "0.79134", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01226", "scoring_system": "epss", "scoring_elements": "0.79151", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01226", "scoring_system": "epss", "scoring_elements": "0.79149", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01226", "scoring_system": "epss", "scoring_elements": "0.79182", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01226", "scoring_system": "epss", "scoring_elements": "0.79189", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01226", "scoring_system": "epss", "scoring_elements": "0.79206", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01226", "scoring_system": "epss", "scoring_elements": "0.79219", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01226", "scoring_system": "epss", "scoring_elements": "0.7924", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01226", "scoring_system": "epss", "scoring_elements": "0.79256", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01226", "scoring_system": "epss", "scoring_elements": "0.79274", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01226", "scoring_system": "epss", "scoring_elements": "0.79106", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01226", "scoring_system": "epss", "scoring_elements": "0.79091", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-39975" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2232682", "reference_id": "2232682", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2232682" }, { "reference_url": "https://github.com/krb5/krb5/commit/88a1701b423c13991a8064feeb26952d3641d840", "reference_id": "88a1701b423c13991a8064feeb26952d3641d840", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-15T05:16:00Z/" } ], "url": "https://github.com/krb5/krb5/commit/88a1701b423c13991a8064feeb26952d3641d840" }, { "reference_url": "https://web.mit.edu/kerberos/www/advisories/", "reference_id": "advisories", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-15T05:16:00Z/" } ], "url": "https://web.mit.edu/kerberos/www/advisories/" }, { "reference_url": "https://security.gentoo.org/glsa/202405-11", "reference_id": "GLSA-202405-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-11" }, { "reference_url": "https://github.com/krb5/krb5/compare/krb5-1.21.1-final...krb5-1.21.2-final", "reference_id": "krb5-1.21.1-final...krb5-1.21.2-final", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-15T05:16:00Z/" } ], "url": "https://github.com/krb5/krb5/compare/krb5-1.21.1-final...krb5-1.21.2-final" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230915-0014/", "reference_id": "ntap-20230915-0014", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-15T05:16:00Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230915-0014/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240201-0005/", "reference_id": "ntap-20240201-0005", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-15T05:16:00Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240201-0005/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240201-0008/", "reference_id": "ntap-20240201-0008", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-15T05:16:00Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240201-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6699", "reference_id": "RHSA-2023:6699", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6699" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/926401?format=api", "purl": "pkg:deb/debian/krb5@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926395?format=api", "purl": "pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-8bra-vqyv-ffd8" }, { "vulnerability": "VCID-vrxs-u44n-vqax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926393?format=api", "purl": "pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-8bra-vqyv-ffd8" }, { "vulnerability": "VCID-vrxs-u44n-vqax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926397?format=api", "purl": "pkg:deb/debian/krb5@1.21.3-5?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-8bra-vqyv-ffd8" }, { "vulnerability": "VCID-vrxs-u44n-vqax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926396?format=api", "purl": "pkg:deb/debian/krb5@1.22.1-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-8bra-vqyv-ffd8" }, { "vulnerability": "VCID-vrxs-u44n-vqax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1112539?format=api", "purl": "pkg:deb/debian/krb5@1.22.1-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2.1%3Fdistro=trixie" } ], "aliases": [ "CVE-2023-39975" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g1xe-gb5c-vkd8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82041?format=api", "vulnerability_id": "VCID-upt3-3nj7-3uft", "summary": "krb5: reversed strlcpy() allows client to crash the KDC", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14844.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14844.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14844", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.11696", "scoring_system": "epss", "scoring_elements": "0.93645", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.11696", "scoring_system": "epss", "scoring_elements": "0.93758", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.11696", "scoring_system": "epss", "scoring_elements": "0.93738", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.11696", "scoring_system": "epss", "scoring_elements": "0.9374", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.11696", "scoring_system": "epss", "scoring_elements": "0.93745", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.11696", "scoring_system": "epss", "scoring_elements": "0.93656", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.11696", "scoring_system": "epss", "scoring_elements": "0.93665", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.11696", "scoring_system": "epss", "scoring_elements": "0.93666", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.11696", "scoring_system": "epss", "scoring_elements": "0.93675", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.11696", "scoring_system": "epss", "scoring_elements": "0.93677", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.11696", "scoring_system": "epss", "scoring_elements": "0.93681", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.11696", "scoring_system": "epss", "scoring_elements": "0.93682", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.11696", "scoring_system": "epss", "scoring_elements": "0.937", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.11696", "scoring_system": "epss", "scoring_elements": "0.93706", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.11696", "scoring_system": "epss", "scoring_elements": "0.93709", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.11696", "scoring_system": "epss", "scoring_elements": "0.93714", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.11696", "scoring_system": "epss", "scoring_elements": "0.93711", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.11696", "scoring_system": "epss", "scoring_elements": "0.9371", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.11696", "scoring_system": "epss", "scoring_elements": "0.93718", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.11696", "scoring_system": "epss", "scoring_elements": "0.93729", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14844" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14844", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14844" }, { "reference_url": "https://github.com/krb5/krb5/pull/981", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/krb5/krb5/pull/981" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/54ZYKEJZ77BXZWGF4NEVKC33ESVROEYC/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/54ZYKEJZ77BXZWGF4NEVKC33ESVROEYC/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N4LS5PIJOCNOUZGLO2OBT6GY334PUOSW/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N4LS5PIJOCNOUZGLO2OBT6GY334PUOSW/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TDE2QOKK4I4TV4WV74ZQWICZ4HJN2MOK/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TDE2QOKK4I4TV4WV74ZQWICZ4HJN2MOK/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220325-0003/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20220325-0003/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753589", "reference_id": "1753589", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753589" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14844", "reference_id": "CVE-2019-14844", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14844" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/926401?format=api", "purl": "pkg:deb/debian/krb5@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926395?format=api", "purl": "pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-8bra-vqyv-ffd8" }, { "vulnerability": "VCID-vrxs-u44n-vqax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926393?format=api", "purl": "pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-8bra-vqyv-ffd8" }, { "vulnerability": "VCID-vrxs-u44n-vqax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926397?format=api", "purl": "pkg:deb/debian/krb5@1.21.3-5?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-8bra-vqyv-ffd8" }, { "vulnerability": "VCID-vrxs-u44n-vqax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926396?format=api", "purl": "pkg:deb/debian/krb5@1.22.1-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-8bra-vqyv-ffd8" }, { "vulnerability": "VCID-vrxs-u44n-vqax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1112539?format=api", "purl": "pkg:deb/debian/krb5@1.22.1-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2.1%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-14844" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-upt3-3nj7-3uft" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62443?format=api", "vulnerability_id": "VCID-w4vk-xwxf-kqdy", "summary": "Multiple vulnerabilities have been found in MIT Kerberos 5, the\n most severe of which may allow remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0283.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0283.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-0283", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01087", "scoring_system": "epss", "scoring_elements": "0.78106", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.01087", "scoring_system": "epss", "scoring_elements": "0.77857", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01087", "scoring_system": "epss", "scoring_elements": "0.77864", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01087", "scoring_system": "epss", "scoring_elements": "0.77891", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01087", "scoring_system": "epss", "scoring_elements": "0.77874", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01087", "scoring_system": "epss", "scoring_elements": "0.77901", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01087", "scoring_system": "epss", "scoring_elements": "0.77906", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01087", "scoring_system": "epss", "scoring_elements": "0.77933", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01087", "scoring_system": "epss", "scoring_elements": "0.77916", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01087", "scoring_system": "epss", "scoring_elements": "0.77954", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01087", "scoring_system": "epss", "scoring_elements": "0.77953", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01087", "scoring_system": "epss", "scoring_elements": "0.77946", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01087", "scoring_system": "epss", "scoring_elements": "0.77979", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01087", "scoring_system": "epss", "scoring_elements": "0.77987", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01087", "scoring_system": "epss", "scoring_elements": "0.78", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01087", "scoring_system": "epss", "scoring_elements": "0.78009", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01087", "scoring_system": "epss", "scoring_elements": "0.78038", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01087", "scoring_system": "epss", "scoring_elements": "0.78055", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01087", "scoring_system": "epss", "scoring_elements": "0.78045", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01087", "scoring_system": "epss", "scoring_elements": "0.78063", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-0283" }, { "reference_url": "http://secunia.com/advisories/43260", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43260" }, { "reference_url": "http://securityreason.com/securityalert/8073", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securityreason.com/securityalert/8073" }, { "reference_url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-002.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-002.txt" }, { "reference_url": "http://www.securityfocus.com/archive/1/516299/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/516299/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/46272", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/46272" }, { "reference_url": "http://www.securitytracker.com/id?1025037", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1025037" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0330", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0330" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=670567", "reference_id": "670567", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=670567" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0283", "reference_id": "CVE-2011-0283", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0283" }, { "reference_url": "https://security.gentoo.org/glsa/201201-13", "reference_id": "GLSA-201201-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-13" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/926401?format=api", "purl": "pkg:deb/debian/krb5@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926395?format=api", "purl": "pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-8bra-vqyv-ffd8" }, { "vulnerability": "VCID-vrxs-u44n-vqax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926393?format=api", "purl": "pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-8bra-vqyv-ffd8" }, { "vulnerability": "VCID-vrxs-u44n-vqax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926397?format=api", "purl": "pkg:deb/debian/krb5@1.21.3-5?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-8bra-vqyv-ffd8" }, { "vulnerability": "VCID-vrxs-u44n-vqax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926396?format=api", "purl": "pkg:deb/debian/krb5@1.22.1-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-8bra-vqyv-ffd8" }, { "vulnerability": "VCID-vrxs-u44n-vqax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1112539?format=api", "purl": "pkg:deb/debian/krb5@1.22.1-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2.1%3Fdistro=trixie" } ], "aliases": [ "CVE-2011-0283" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w4vk-xwxf-kqdy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89764?format=api", "vulnerability_id": "VCID-wm5m-9fdb-9qex", "summary": "security flaw", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0041.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0041.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2003-0041", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01228", "scoring_system": "epss", "scoring_elements": "0.79095", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01228", "scoring_system": "epss", "scoring_elements": "0.79102", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01228", "scoring_system": "epss", "scoring_elements": "0.79128", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01228", "scoring_system": "epss", "scoring_elements": "0.79114", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01228", "scoring_system": "epss", "scoring_elements": "0.79138", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01228", "scoring_system": "epss", "scoring_elements": "0.79146", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01228", "scoring_system": "epss", "scoring_elements": "0.79171", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01228", "scoring_system": "epss", "scoring_elements": "0.79155", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01228", "scoring_system": "epss", "scoring_elements": "0.79172", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01228", "scoring_system": "epss", "scoring_elements": "0.7917", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01228", "scoring_system": "epss", "scoring_elements": "0.79168", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01228", "scoring_system": "epss", "scoring_elements": "0.79202", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01228", "scoring_system": "epss", "scoring_elements": "0.79209", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01228", "scoring_system": "epss", "scoring_elements": "0.79225", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01228", "scoring_system": "epss", "scoring_elements": "0.79239", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01228", "scoring_system": "epss", "scoring_elements": "0.7926", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01228", "scoring_system": "epss", "scoring_elements": "0.79276", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01228", "scoring_system": "epss", "scoring_elements": "0.79294", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01228", "scoring_system": "epss", "scoring_elements": "0.79334", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2003-0041" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616943", "reference_id": "1616943", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616943" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2003:020", "reference_id": "RHSA-2003:020", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2003:020" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2003:021", "reference_id": "RHSA-2003:021", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2003:021" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2003:168", "reference_id": "RHSA-2003:168", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2003:168" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/926401?format=api", "purl": "pkg:deb/debian/krb5@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926395?format=api", "purl": "pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-8bra-vqyv-ffd8" }, { "vulnerability": "VCID-vrxs-u44n-vqax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926393?format=api", "purl": "pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-8bra-vqyv-ffd8" }, { "vulnerability": "VCID-vrxs-u44n-vqax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926397?format=api", "purl": "pkg:deb/debian/krb5@1.21.3-5?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-8bra-vqyv-ffd8" }, { "vulnerability": "VCID-vrxs-u44n-vqax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926396?format=api", "purl": "pkg:deb/debian/krb5@1.22.1-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-8bra-vqyv-ffd8" }, { "vulnerability": "VCID-vrxs-u44n-vqax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1112539?format=api", "purl": "pkg:deb/debian/krb5@1.22.1-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2.1%3Fdistro=trixie" } ], "aliases": [ "CVE-2003-0041" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wm5m-9fdb-9qex" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@0%3Fdistro=trixie" }