{"url":"http://public2.vulnerablecode.io/api/packages/926445?format=json","purl":"pkg:deb/debian/krb5@1.12.1%2Bdfsg-10?distro=trixie","type":"deb","namespace":"debian","name":"krb5","version":"1.12.1+dfsg-10","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"1.12.1+dfsg-16","latest_non_vulnerable_version":"1.22.1-2","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49821?format=json","vulnerability_id":"VCID-4e9j-8vtc-tbda","summary":"A vulnerability has been found in MIT Kerberos 5, possibly\n    resulting in arbitrary code execution or a Denial of Service condition.","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0477.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0477.html"},{"reference_url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=8018","reference_id":"","reference_type":"","scores":[],"url":"http://krbdev.mit.edu/rt/Ticket/Display.html?id=8018"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140132.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140132.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151103.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151103.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00016.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00016.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-02/msg00044.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-02/msg00044.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5351.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5351.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-5351","reference_id":"","reference_type":"","scores":[{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57338","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57276","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57358","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57381","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57357","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57408","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57411","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57426","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57404","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57386","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57412","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57409","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57387","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57343","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57365","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57345","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57294","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-5351"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5351","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5351"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201412-53.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201412-53.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/97028","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/97028"},{"reference_url":"https://github.com/krb5/krb5/commit/af0ed4df4dfae762ab5fb605f5a0c8f59cb4f6ca","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/krb5/krb5/commit/af0ed4df4dfae762ab5fb605f5a0c8f59cb4f6ca"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:224","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:224"},{"reference_url":"http://www.securityfocus.com/bid/70380","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/70380"},{"reference_url":"http://www.securitytracker.com/id/1031003","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1031003"},{"reference_url":"http://www.ubuntu.com/usn/USN-2498-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2498-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1145425","reference_id":"1145425","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1145425"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762479","reference_id":"762479","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762479"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mit:kerberos_5:1.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-5351","reference_id":"CVE-2014-5351","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-5351"},{"reference_url":"https://security.gentoo.org/glsa/201412-53","reference_id":"GLSA-201412-53","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-53"},{"reference_url":"https://usn.ubuntu.com/2498-1/","reference_id":"USN-2498-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2498-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/926445?format=json","purl":"pkg:deb/debian/krb5@1.12.1%2Bdfsg-10?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-10%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926395?format=json","purl":"pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926393?format=json","purl":"pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926397?format=json","purl":"pkg:deb/debian/krb5@1.21.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/926396?format=json","purl":"pkg:deb/debian/krb5@1.22.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie"}],"aliases":["CVE-2014-5351"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4e9j-8vtc-tbda"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-10%3Fdistro=trixie"}