Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/keepalived@1:2.2.7-1?distro=trixie
Typedeb
Namespacedebian
Namekeepalived
Version1:2.2.7-1
Qualifiers
distro trixie
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1:2.3.2-1
Latest_non_vulnerable_version1:2.3.4-1
Affected_by_vulnerabilities
0
url VCID-ks48-yq6s-aue1
vulnerability_id VCID-ks48-yq6s-aue1
summary keepalived: Integer overflow vulnerability in vrrp_ipsets_handler
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-41184.json
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-41184.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-41184
reference_id
reference_type
scores
0
value 0.00209
scoring_system epss
scoring_elements 0.43318
published_at 2026-04-21T12:55:00Z
1
value 0.00209
scoring_system epss
scoring_elements 0.43333
published_at 2026-04-13T12:55:00Z
2
value 0.00209
scoring_system epss
scoring_elements 0.43393
published_at 2026-04-16T12:55:00Z
3
value 0.00209
scoring_system epss
scoring_elements 0.43383
published_at 2026-04-18T12:55:00Z
4
value 0.00209
scoring_system epss
scoring_elements 0.43327
published_at 2026-04-02T12:55:00Z
5
value 0.00209
scoring_system epss
scoring_elements 0.43356
published_at 2026-04-04T12:55:00Z
6
value 0.00209
scoring_system epss
scoring_elements 0.43293
published_at 2026-04-07T12:55:00Z
7
value 0.00209
scoring_system epss
scoring_elements 0.43345
published_at 2026-04-08T12:55:00Z
8
value 0.00209
scoring_system epss
scoring_elements 0.43359
published_at 2026-04-09T12:55:00Z
9
value 0.00209
scoring_system epss
scoring_elements 0.4338
published_at 2026-04-11T12:55:00Z
10
value 0.00209
scoring_system epss
scoring_elements 0.43348
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-41184
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41184
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1077370
reference_id 1077370
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1077370
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2298532
reference_id 2298532
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2298532
6
reference_url https://github.com/acassen/keepalived/issues/2447#issuecomment-2231329734
reference_id 2447#issuecomment-2231329734
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-18T13:39:29Z/
url https://github.com/acassen/keepalived/issues/2447#issuecomment-2231329734
7
reference_url https://access.redhat.com/errata/RHSA-2025:0743
reference_id RHSA-2025:0743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0743
8
reference_url https://access.redhat.com/errata/RHSA-2025:0917
reference_id RHSA-2025:0917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0917
9
reference_url https://access.redhat.com/errata/RHSA-2025:9775
reference_id RHSA-2025:9775
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:9775
fixed_packages
0
url pkg:deb/debian/keepalived@1:2.3.2-1?distro=trixie
purl pkg:deb/debian/keepalived@1:2.3.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.3.2-1%3Fdistro=trixie
1
url pkg:deb/debian/keepalived@1:2.3.3-1?distro=trixie
purl pkg:deb/debian/keepalived@1:2.3.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.3.3-1%3Fdistro=trixie
2
url pkg:deb/debian/keepalived@1:2.3.4-1?distro=trixie
purl pkg:deb/debian/keepalived@1:2.3.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.3.4-1%3Fdistro=trixie
aliases CVE-2024-41184
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ks48-yq6s-aue1
Fixing_vulnerabilities
0
url VCID-464a-ftn8-33h9
vulnerability_id VCID-464a-ftn8-33h9
summary keepalived: dbus access control bypass
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44225.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44225.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-44225
reference_id
reference_type
scores
0
value 0.00044
scoring_system epss
scoring_elements 0.13445
published_at 2026-04-01T12:55:00Z
1
value 0.00044
scoring_system epss
scoring_elements 0.13485
published_at 2026-04-08T12:55:00Z
2
value 0.00044
scoring_system epss
scoring_elements 0.13545
published_at 2026-04-02T12:55:00Z
3
value 0.00044
scoring_system epss
scoring_elements 0.13607
published_at 2026-04-04T12:55:00Z
4
value 0.00044
scoring_system epss
scoring_elements 0.13403
published_at 2026-04-07T12:55:00Z
5
value 0.00044
scoring_system epss
scoring_elements 0.13534
published_at 2026-04-09T12:55:00Z
6
value 0.00044
scoring_system epss
scoring_elements 0.13507
published_at 2026-04-11T12:55:00Z
7
value 0.00051
scoring_system epss
scoring_elements 0.161
published_at 2026-04-12T12:55:00Z
8
value 0.00051
scoring_system epss
scoring_elements 0.16023
published_at 2026-04-21T12:55:00Z
9
value 0.00051
scoring_system epss
scoring_elements 0.16032
published_at 2026-04-13T12:55:00Z
10
value 0.00051
scoring_system epss
scoring_elements 0.15966
published_at 2026-04-16T12:55:00Z
11
value 0.00051
scoring_system epss
scoring_elements 0.15978
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-44225
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44225
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44225
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2027156
reference_id 2027156
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2027156
5
reference_url https://security.archlinux.org/AVG-2587
reference_id AVG-2587
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2587
6
reference_url https://access.redhat.com/errata/RHSA-2022:1930
reference_id RHSA-2022:1930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1930
7
reference_url https://usn.ubuntu.com/5188-1/
reference_id USN-5188-1
reference_type
scores
url https://usn.ubuntu.com/5188-1/
fixed_packages
0
url pkg:deb/debian/keepalived@1:2.1.5-0.2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/keepalived@1:2.1.5-0.2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ks48-yq6s-aue1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.1.5-0.2%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/keepalived@1:2.2.4-0.2?distro=trixie
purl pkg:deb/debian/keepalived@1:2.2.4-0.2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.2.4-0.2%3Fdistro=trixie
2
url pkg:deb/debian/keepalived@1:2.2.7-1?distro=trixie
purl pkg:deb/debian/keepalived@1:2.2.7-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ks48-yq6s-aue1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.2.7-1%3Fdistro=trixie
3
url pkg:deb/debian/keepalived@1:2.3.3-1?distro=trixie
purl pkg:deb/debian/keepalived@1:2.3.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.3.3-1%3Fdistro=trixie
4
url pkg:deb/debian/keepalived@1:2.3.4-1?distro=trixie
purl pkg:deb/debian/keepalived@1:2.3.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.3.4-1%3Fdistro=trixie
aliases CVE-2021-44225
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-464a-ftn8-33h9
1
url VCID-amp5-htt6-1yfm
vulnerability_id VCID-amp5-htt6-1yfm
summary
Multiple vulnerabilities have been found in Keepalived, the worst
    of which could allow an attacker to cause Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19045.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19045.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-19045
reference_id
reference_type
scores
0
value 0.0045
scoring_system epss
scoring_elements 0.63563
published_at 2026-04-01T12:55:00Z
1
value 0.0045
scoring_system epss
scoring_elements 0.63623
published_at 2026-04-02T12:55:00Z
2
value 0.0045
scoring_system epss
scoring_elements 0.63649
published_at 2026-04-04T12:55:00Z
3
value 0.0045
scoring_system epss
scoring_elements 0.63608
published_at 2026-04-07T12:55:00Z
4
value 0.0045
scoring_system epss
scoring_elements 0.6366
published_at 2026-04-08T12:55:00Z
5
value 0.0045
scoring_system epss
scoring_elements 0.63676
published_at 2026-04-12T12:55:00Z
6
value 0.0045
scoring_system epss
scoring_elements 0.63691
published_at 2026-04-11T12:55:00Z
7
value 0.0045
scoring_system epss
scoring_elements 0.63643
published_at 2026-04-13T12:55:00Z
8
value 0.0045
scoring_system epss
scoring_elements 0.6368
published_at 2026-04-16T12:55:00Z
9
value 0.0045
scoring_system epss
scoring_elements 0.6369
published_at 2026-04-18T12:55:00Z
10
value 0.0045
scoring_system epss
scoring_elements 0.63673
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-19045
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19045
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1651866
reference_id 1651866
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1651866
5
reference_url https://security.gentoo.org/glsa/201903-01
reference_id GLSA-201903-01
reference_type
scores
url https://security.gentoo.org/glsa/201903-01
fixed_packages
0
url pkg:deb/debian/keepalived@1:2.0.10-1?distro=trixie
purl pkg:deb/debian/keepalived@1:2.0.10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.0.10-1%3Fdistro=trixie
1
url pkg:deb/debian/keepalived@1:2.1.5-0.2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/keepalived@1:2.1.5-0.2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ks48-yq6s-aue1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.1.5-0.2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/keepalived@1:2.2.7-1?distro=trixie
purl pkg:deb/debian/keepalived@1:2.2.7-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ks48-yq6s-aue1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.2.7-1%3Fdistro=trixie
3
url pkg:deb/debian/keepalived@1:2.3.3-1?distro=trixie
purl pkg:deb/debian/keepalived@1:2.3.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.3.3-1%3Fdistro=trixie
4
url pkg:deb/debian/keepalived@1:2.3.4-1?distro=trixie
purl pkg:deb/debian/keepalived@1:2.3.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.3.4-1%3Fdistro=trixie
aliases CVE-2018-19045
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-amp5-htt6-1yfm
2
url VCID-e88d-2ht5-byab
vulnerability_id VCID-e88d-2ht5-byab
summary
Multiple vulnerabilities have been found in Keepalived, the worst
    of which could allow an attacker to cause Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19046.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19046.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-19046
reference_id
reference_type
scores
0
value 0.00145
scoring_system epss
scoring_elements 0.34716
published_at 2026-04-01T12:55:00Z
1
value 0.00145
scoring_system epss
scoring_elements 0.34924
published_at 2026-04-02T12:55:00Z
2
value 0.00145
scoring_system epss
scoring_elements 0.3495
published_at 2026-04-04T12:55:00Z
3
value 0.00145
scoring_system epss
scoring_elements 0.3483
published_at 2026-04-07T12:55:00Z
4
value 0.00145
scoring_system epss
scoring_elements 0.34875
published_at 2026-04-08T12:55:00Z
5
value 0.00145
scoring_system epss
scoring_elements 0.34902
published_at 2026-04-09T12:55:00Z
6
value 0.00145
scoring_system epss
scoring_elements 0.34906
published_at 2026-04-11T12:55:00Z
7
value 0.00145
scoring_system epss
scoring_elements 0.34869
published_at 2026-04-12T12:55:00Z
8
value 0.00145
scoring_system epss
scoring_elements 0.34846
published_at 2026-04-13T12:55:00Z
9
value 0.00145
scoring_system epss
scoring_elements 0.34885
published_at 2026-04-16T12:55:00Z
10
value 0.00145
scoring_system epss
scoring_elements 0.34868
published_at 2026-04-18T12:55:00Z
11
value 0.00145
scoring_system epss
scoring_elements 0.34823
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-19046
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19046
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1651869
reference_id 1651869
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1651869
5
reference_url https://security.gentoo.org/glsa/201903-01
reference_id GLSA-201903-01
reference_type
scores
url https://security.gentoo.org/glsa/201903-01
fixed_packages
0
url pkg:deb/debian/keepalived@1:2.0.10-1?distro=trixie
purl pkg:deb/debian/keepalived@1:2.0.10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.0.10-1%3Fdistro=trixie
1
url pkg:deb/debian/keepalived@1:2.1.5-0.2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/keepalived@1:2.1.5-0.2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ks48-yq6s-aue1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.1.5-0.2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/keepalived@1:2.2.7-1?distro=trixie
purl pkg:deb/debian/keepalived@1:2.2.7-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ks48-yq6s-aue1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.2.7-1%3Fdistro=trixie
3
url pkg:deb/debian/keepalived@1:2.3.3-1?distro=trixie
purl pkg:deb/debian/keepalived@1:2.3.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.3.3-1%3Fdistro=trixie
4
url pkg:deb/debian/keepalived@1:2.3.4-1?distro=trixie
purl pkg:deb/debian/keepalived@1:2.3.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.3.4-1%3Fdistro=trixie
aliases CVE-2018-19046
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e88d-2ht5-byab
3
url VCID-naqn-kvq6-h7c1
vulnerability_id VCID-naqn-kvq6-h7c1
summary
Keepalived uses world-writable PID files, allowing a local attacker
    to kill arbitrary processes.
references
0
reference_url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=626281
reference_id
reference_type
scores
url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=626281
1
reference_url http://lists.debian.org/debian-security/2011/05/msg00012.html
reference_id
reference_type
scores
url http://lists.debian.org/debian-security/2011/05/msg00012.html
2
reference_url http://lists.debian.org/debian-security/2011/05/msg00013.html
reference_id
reference_type
scores
url http://lists.debian.org/debian-security/2011/05/msg00013.html
3
reference_url http://lists.debian.org/debian-security/2011/05/msg00018.html
reference_id
reference_type
scores
url http://lists.debian.org/debian-security/2011/05/msg00018.html
4
reference_url http://openwall.com/lists/oss-security/2011/05/10/5
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/05/10/5
5
reference_url http://openwall.com/lists/oss-security/2011/05/16/7
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/05/16/7
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1784
reference_id
reference_type
scores
0
value 0.00047
scoring_system epss
scoring_elements 0.14324
published_at 2026-04-21T12:55:00Z
1
value 0.00047
scoring_system epss
scoring_elements 0.14426
published_at 2026-04-01T12:55:00Z
2
value 0.00047
scoring_system epss
scoring_elements 0.1449
published_at 2026-04-02T12:55:00Z
3
value 0.00047
scoring_system epss
scoring_elements 0.1456
published_at 2026-04-04T12:55:00Z
4
value 0.00047
scoring_system epss
scoring_elements 0.14368
published_at 2026-04-07T12:55:00Z
5
value 0.00047
scoring_system epss
scoring_elements 0.14453
published_at 2026-04-08T12:55:00Z
6
value 0.00047
scoring_system epss
scoring_elements 0.14507
published_at 2026-04-09T12:55:00Z
7
value 0.00047
scoring_system epss
scoring_elements 0.14455
published_at 2026-04-11T12:55:00Z
8
value 0.00047
scoring_system epss
scoring_elements 0.14418
published_at 2026-04-12T12:55:00Z
9
value 0.00047
scoring_system epss
scoring_elements 0.14361
published_at 2026-04-13T12:55:00Z
10
value 0.00047
scoring_system epss
scoring_elements 0.14252
published_at 2026-04-16T12:55:00Z
11
value 0.00047
scoring_system epss
scoring_elements 0.14253
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1784
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=704039
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=704039
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1784
9
reference_url http://secunia.com/advisories/44460
reference_id
reference_type
scores
url http://secunia.com/advisories/44460
10
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/67477
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/67477
11
reference_url http://www.osvdb.org/72380
reference_id
reference_type
scores
url http://www.osvdb.org/72380
12
reference_url http://www.securityfocus.com/bid/47859
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/47859
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=626281
reference_id 626281
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=626281
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:0.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.2.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:0.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.2.3:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:0.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.2.6:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:0.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.2.7:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:0.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.3.5:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:0.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.3.6:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:0.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.3.7:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:0.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.3.8:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.4.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:0.4.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.4.8:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.4.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:0.4.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.4.9:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.4.9a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:0.4.9a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.4.9a:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:0.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.5.3:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:0.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.5.5:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:0.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.5.6:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:0.5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.5.7:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:0.5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.5.8:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:0.5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.5.9:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:0.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.6.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.6.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:0.6.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.6.10:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:0.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.6.2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:0.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.6.3:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:0.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.6.4:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:0.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.6.5:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:0.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.6.6:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:0.6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.6.7:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:0.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.6.8:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.6.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:0.6.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.6.9:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:0.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.7.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:0.7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.7.6:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:1.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.0.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.0.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.0.2:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.0.3:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.1:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:1.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.10:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:1.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.11:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:1.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.12:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:1.1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.13:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:1.1.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.14:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:1.1.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.15:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:1.1.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.16:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:1.1.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.17:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:1.1.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.18:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:1.1.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.19:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.2:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:1.1.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.20:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.3:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.4:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:1.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.5:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.6:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:1.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.7:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:1.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.8:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:1.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.9:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:1.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.2.0:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:keepalived:keepalived:1.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.2.1:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-1784
reference_id CVE-2011-1784
reference_type
scores
0
value 3.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2011-1784
72
reference_url https://security.gentoo.org/glsa/201207-07
reference_id GLSA-201207-07
reference_type
scores
url https://security.gentoo.org/glsa/201207-07
fixed_packages
0
url pkg:deb/debian/keepalived@1:1.2.2-2?distro=trixie
purl pkg:deb/debian/keepalived@1:1.2.2-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:1.2.2-2%3Fdistro=trixie
1
url pkg:deb/debian/keepalived@1:2.1.5-0.2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/keepalived@1:2.1.5-0.2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ks48-yq6s-aue1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.1.5-0.2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/keepalived@1:2.2.7-1?distro=trixie
purl pkg:deb/debian/keepalived@1:2.2.7-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ks48-yq6s-aue1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.2.7-1%3Fdistro=trixie
3
url pkg:deb/debian/keepalived@1:2.3.3-1?distro=trixie
purl pkg:deb/debian/keepalived@1:2.3.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.3.3-1%3Fdistro=trixie
4
url pkg:deb/debian/keepalived@1:2.3.4-1?distro=trixie
purl pkg:deb/debian/keepalived@1:2.3.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.3.4-1%3Fdistro=trixie
aliases CVE-2011-1784
risk_score 1.6
exploitability 0.5
weighted_severity 3.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-naqn-kvq6-h7c1
4
url VCID-qp12-vdxh-uqfx
vulnerability_id VCID-qp12-vdxh-uqfx
summary
Multiple vulnerabilities have been found in Keepalived, the worst
    of which could allow an attacker to cause Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19044.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19044.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-19044
reference_id
reference_type
scores
0
value 0.00119
scoring_system epss
scoring_elements 0.3081
published_at 2026-04-01T12:55:00Z
1
value 0.00119
scoring_system epss
scoring_elements 0.30938
published_at 2026-04-02T12:55:00Z
2
value 0.00119
scoring_system epss
scoring_elements 0.30985
published_at 2026-04-04T12:55:00Z
3
value 0.00119
scoring_system epss
scoring_elements 0.30802
published_at 2026-04-07T12:55:00Z
4
value 0.00119
scoring_system epss
scoring_elements 0.3086
published_at 2026-04-08T12:55:00Z
5
value 0.00119
scoring_system epss
scoring_elements 0.30891
published_at 2026-04-09T12:55:00Z
6
value 0.00119
scoring_system epss
scoring_elements 0.30892
published_at 2026-04-11T12:55:00Z
7
value 0.00119
scoring_system epss
scoring_elements 0.30849
published_at 2026-04-12T12:55:00Z
8
value 0.00119
scoring_system epss
scoring_elements 0.30804
published_at 2026-04-13T12:55:00Z
9
value 0.00119
scoring_system epss
scoring_elements 0.30836
published_at 2026-04-16T12:55:00Z
10
value 0.00119
scoring_system epss
scoring_elements 0.30816
published_at 2026-04-18T12:55:00Z
11
value 0.00119
scoring_system epss
scoring_elements 0.3078
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-19044
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19044
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19044
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1651863
reference_id 1651863
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1651863
5
reference_url https://security.gentoo.org/glsa/201903-01
reference_id GLSA-201903-01
reference_type
scores
url https://security.gentoo.org/glsa/201903-01
6
reference_url https://access.redhat.com/errata/RHSA-2019:2285
reference_id RHSA-2019:2285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2285
fixed_packages
0
url pkg:deb/debian/keepalived@1:2.0.10-1?distro=trixie
purl pkg:deb/debian/keepalived@1:2.0.10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.0.10-1%3Fdistro=trixie
1
url pkg:deb/debian/keepalived@1:2.1.5-0.2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/keepalived@1:2.1.5-0.2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ks48-yq6s-aue1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.1.5-0.2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/keepalived@1:2.2.7-1?distro=trixie
purl pkg:deb/debian/keepalived@1:2.2.7-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ks48-yq6s-aue1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.2.7-1%3Fdistro=trixie
3
url pkg:deb/debian/keepalived@1:2.3.3-1?distro=trixie
purl pkg:deb/debian/keepalived@1:2.3.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.3.3-1%3Fdistro=trixie
4
url pkg:deb/debian/keepalived@1:2.3.4-1?distro=trixie
purl pkg:deb/debian/keepalived@1:2.3.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.3.4-1%3Fdistro=trixie
aliases CVE-2018-19044
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qp12-vdxh-uqfx
5
url VCID-vq7d-sshy-uyft
vulnerability_id VCID-vq7d-sshy-uyft
summary
Multiple vulnerabilities have been found in Keepalived, the worst
    of which could allow an attacker to cause Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19115.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19115.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-19115
reference_id
reference_type
scores
0
value 0.05682
scoring_system epss
scoring_elements 0.9041
published_at 2026-04-21T12:55:00Z
1
value 0.06203
scoring_system epss
scoring_elements 0.90819
published_at 2026-04-01T12:55:00Z
2
value 0.06203
scoring_system epss
scoring_elements 0.90825
published_at 2026-04-02T12:55:00Z
3
value 0.06203
scoring_system epss
scoring_elements 0.90835
published_at 2026-04-04T12:55:00Z
4
value 0.06203
scoring_system epss
scoring_elements 0.90845
published_at 2026-04-07T12:55:00Z
5
value 0.06203
scoring_system epss
scoring_elements 0.90856
published_at 2026-04-08T12:55:00Z
6
value 0.06203
scoring_system epss
scoring_elements 0.90863
published_at 2026-04-09T12:55:00Z
7
value 0.06203
scoring_system epss
scoring_elements 0.90872
published_at 2026-04-12T12:55:00Z
8
value 0.06203
scoring_system epss
scoring_elements 0.9087
published_at 2026-04-13T12:55:00Z
9
value 0.06203
scoring_system epss
scoring_elements 0.90894
published_at 2026-04-16T12:55:00Z
10
value 0.06203
scoring_system epss
scoring_elements 0.90892
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-19115
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19115
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1651871
reference_id 1651871
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1651871
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914393
reference_id 914393
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914393
6
reference_url https://security.gentoo.org/glsa/201903-01
reference_id GLSA-201903-01
reference_type
scores
url https://security.gentoo.org/glsa/201903-01
7
reference_url https://access.redhat.com/errata/RHSA-2019:0022
reference_id RHSA-2019:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0022
8
reference_url https://access.redhat.com/errata/RHSA-2019:1792
reference_id RHSA-2019:1792
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1792
9
reference_url https://access.redhat.com/errata/RHSA-2019:1945
reference_id RHSA-2019:1945
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1945
10
reference_url https://usn.ubuntu.com/3995-1/
reference_id USN-3995-1
reference_type
scores
url https://usn.ubuntu.com/3995-1/
11
reference_url https://usn.ubuntu.com/3995-2/
reference_id USN-3995-2
reference_type
scores
url https://usn.ubuntu.com/3995-2/
fixed_packages
0
url pkg:deb/debian/keepalived@1:2.0.10-1?distro=trixie
purl pkg:deb/debian/keepalived@1:2.0.10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.0.10-1%3Fdistro=trixie
1
url pkg:deb/debian/keepalived@1:2.1.5-0.2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/keepalived@1:2.1.5-0.2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ks48-yq6s-aue1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.1.5-0.2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/keepalived@1:2.2.7-1?distro=trixie
purl pkg:deb/debian/keepalived@1:2.2.7-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ks48-yq6s-aue1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.2.7-1%3Fdistro=trixie
3
url pkg:deb/debian/keepalived@1:2.3.3-1?distro=trixie
purl pkg:deb/debian/keepalived@1:2.3.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.3.3-1%3Fdistro=trixie
4
url pkg:deb/debian/keepalived@1:2.3.4-1?distro=trixie
purl pkg:deb/debian/keepalived@1:2.3.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.3.4-1%3Fdistro=trixie
aliases CVE-2018-19115
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vq7d-sshy-uyft
Risk_score4.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.2.7-1%3Fdistro=trixie