Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-svsr-ktp8-n7a5
Summary389-ds-base: DoS when connecting with a missing username/dn
Aliases
0
alias CVE-2013-0336
Fixed_packages
0
url pkg:deb/debian/389-ds-base@1.3.2.9-1?distro=trixie
purl pkg:deb/debian/389-ds-base@1.3.2.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.3.2.9-1%3Fdistro=trixie
1
url pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie
purl pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-63rm-mq1r-5fbz
1
vulnerability VCID-6f2q-qatg-kucr
2
vulnerability VCID-bpw5-xeju-93f3
3
vulnerability VCID-kbvd-dfmn-buat
4
vulnerability VCID-pqe1-ewjj-uqbn
5
vulnerability VCID-xs3r-chc9-27dr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%3Fdistro=trixie
2
url pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6f2q-qatg-kucr
1
vulnerability VCID-bpw5-xeju-93f3
2
vulnerability VCID-kbvd-dfmn-buat
3
vulnerability VCID-pqe1-ewjj-uqbn
4
vulnerability VCID-xs3r-chc9-27dr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-pqe1-ewjj-uqbn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie
4
url pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie
purl pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie
5
url pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie
purl pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie
Affected_packages
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0336.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0336.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-0336
reference_id
reference_type
scores
0
value 0.01102
scoring_system epss
scoring_elements 0.78207
published_at 2026-05-12T12:55:00Z
1
value 0.01102
scoring_system epss
scoring_elements 0.78007
published_at 2026-04-01T12:55:00Z
2
value 0.01102
scoring_system epss
scoring_elements 0.78014
published_at 2026-04-02T12:55:00Z
3
value 0.01102
scoring_system epss
scoring_elements 0.78043
published_at 2026-04-04T12:55:00Z
4
value 0.01102
scoring_system epss
scoring_elements 0.78026
published_at 2026-04-07T12:55:00Z
5
value 0.01102
scoring_system epss
scoring_elements 0.78052
published_at 2026-04-08T12:55:00Z
6
value 0.01102
scoring_system epss
scoring_elements 0.78057
published_at 2026-04-09T12:55:00Z
7
value 0.01102
scoring_system epss
scoring_elements 0.78083
published_at 2026-04-11T12:55:00Z
8
value 0.01102
scoring_system epss
scoring_elements 0.78066
published_at 2026-04-12T12:55:00Z
9
value 0.01102
scoring_system epss
scoring_elements 0.78062
published_at 2026-04-13T12:55:00Z
10
value 0.01102
scoring_system epss
scoring_elements 0.78097
published_at 2026-04-16T12:55:00Z
11
value 0.01102
scoring_system epss
scoring_elements 0.78096
published_at 2026-04-18T12:55:00Z
12
value 0.01102
scoring_system epss
scoring_elements 0.7809
published_at 2026-04-21T12:55:00Z
13
value 0.01102
scoring_system epss
scoring_elements 0.78123
published_at 2026-04-24T12:55:00Z
14
value 0.01102
scoring_system epss
scoring_elements 0.78129
published_at 2026-04-26T12:55:00Z
15
value 0.01102
scoring_system epss
scoring_elements 0.78143
published_at 2026-04-29T12:55:00Z
16
value 0.01102
scoring_system epss
scoring_elements 0.78154
published_at 2026-05-05T12:55:00Z
17
value 0.01102
scoring_system epss
scoring_elements 0.78181
published_at 2026-05-07T12:55:00Z
18
value 0.01102
scoring_system epss
scoring_elements 0.78197
published_at 2026-05-09T12:55:00Z
19
value 0.01102
scoring_system epss
scoring_elements 0.78188
published_at 2026-05-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-0336
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0336
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0336
3
reference_url http://secunia.com/advisories/52763
reference_id
reference_type
scores
url http://secunia.com/advisories/52763
4
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/83132
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/83132
5
reference_url https://fedorahosted.org/freeipa/ticket/3539
reference_id
reference_type
scores
url https://fedorahosted.org/freeipa/ticket/3539
6
reference_url https://git.fedorahosted.org/cgit/freeipa.git/commit/?id=7b45e33400355df44e75576ef7f70a39d163bf8e
reference_id
reference_type
scores
url https://git.fedorahosted.org/cgit/freeipa.git/commit/?id=7b45e33400355df44e75576ef7f70a39d163bf8e
7
reference_url http://www.securityfocus.com/bid/58747
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/58747
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704077
reference_id 704077
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704077
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=913751
reference_id 913751
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=913751
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:freeipa:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:freeipa:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:freeipa:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:freeipa:3.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:freeipa:3.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:freeipa:3.0.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:freeipa:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:freeipa:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:freeipa:3.0.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:freeipa:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:freeipa:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:freeipa:3.0.2:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:freeipa:3.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:freeipa:3.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:freeipa:3.1.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:freeipa:3.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:freeipa:3.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:freeipa:3.1.2:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:freeipa:3.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:freeipa:3.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:freeipa:3.1.3:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:freeipa:3.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:freeipa:3.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:freeipa:3.1.4:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-0336
reference_id CVE-2013-0336
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-0336
Weaknesses
0
cwe_id 20
name Improper Input Validation
description The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Exploits
Severity_range_score5.0 - 5.0
Exploitabilitynull
Weighted_severitynull
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-svsr-ktp8-n7a5