Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/926193?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/926193?format=api", "purl": "pkg:deb/debian/keepalived@1:2.1.5-0.2%2Bdeb11u1?distro=trixie", "type": "deb", "namespace": "debian", "name": "keepalived", "version": "1:2.1.5-0.2+deb11u1", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "1:2.2.4-0.2", "latest_non_vulnerable_version": "1:2.3.4-1", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/74692?format=api", "vulnerability_id": "VCID-ks48-yq6s-aue1", "summary": "keepalived: Integer overflow vulnerability in vrrp_ipsets_handler", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-41184.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-41184.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-41184", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43043", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43251", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43254", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43175", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43327", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43356", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43293", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43345", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43359", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.4338", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43348", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43333", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43393", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43383", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43318", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-41184" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41184", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41184" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1077370", "reference_id": "1077370", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1077370" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298532", "reference_id": "2298532", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298532" }, { "reference_url": "https://github.com/acassen/keepalived/issues/2447#issuecomment-2231329734", "reference_id": "2447#issuecomment-2231329734", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-18T13:39:29Z/" } ], "url": "https://github.com/acassen/keepalived/issues/2447#issuecomment-2231329734" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0743", "reference_id": "RHSA-2025:0743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0743" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0917", "reference_id": "RHSA-2025:0917", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0917" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:9775", "reference_id": "RHSA-2025:9775", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:9775" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/926198?format=api", "purl": "pkg:deb/debian/keepalived@1:2.3.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.3.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926195?format=api", "purl": "pkg:deb/debian/keepalived@1:2.3.3-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.3.3-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926194?format=api", "purl": "pkg:deb/debian/keepalived@1:2.3.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.3.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2024-41184" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ks48-yq6s-aue1" } ], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79898?format=api", "vulnerability_id": "VCID-464a-ftn8-33h9", "summary": "keepalived: dbus access control bypass", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44225.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44225.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-44225", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13445", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13507", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13545", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13607", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13403", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13485", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13534", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15877", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15913", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15753", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.161", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.16032", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15966", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15978", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.16023", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15918", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-44225" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44225", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44225" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027156", "reference_id": "2027156", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027156" }, { "reference_url": "https://security.archlinux.org/AVG-2587", "reference_id": "AVG-2587", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2587" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1930", "reference_id": "RHSA-2022:1930", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1930" }, { "reference_url": "https://usn.ubuntu.com/5188-1/", "reference_id": "USN-5188-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5188-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/926193?format=api", "purl": "pkg:deb/debian/keepalived@1:2.1.5-0.2%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ks48-yq6s-aue1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.1.5-0.2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926197?format=api", "purl": "pkg:deb/debian/keepalived@1:2.2.4-0.2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.2.4-0.2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926191?format=api", "purl": "pkg:deb/debian/keepalived@1:2.2.7-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ks48-yq6s-aue1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.2.7-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926195?format=api", "purl": "pkg:deb/debian/keepalived@1:2.3.3-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.3.3-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926194?format=api", "purl": "pkg:deb/debian/keepalived@1:2.3.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.3.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2021-44225" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-464a-ftn8-33h9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48679?format=api", "vulnerability_id": "VCID-amp5-htt6-1yfm", "summary": "Multiple vulnerabilities have been found in Keepalived, the worst\n of which could allow an attacker to cause Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19045.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19045.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19045", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63563", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63623", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63649", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63608", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.6366", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63676", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63691", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63643", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.6368", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.6369", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63673", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63692", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63704", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63699", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19045" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19045", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19045" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1651866", "reference_id": "1651866", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1651866" }, { "reference_url": "https://security.gentoo.org/glsa/201903-01", "reference_id": "GLSA-201903-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201903-01" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/926196?format=api", "purl": "pkg:deb/debian/keepalived@1:2.0.10-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.0.10-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926193?format=api", "purl": "pkg:deb/debian/keepalived@1:2.1.5-0.2%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ks48-yq6s-aue1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.1.5-0.2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926191?format=api", "purl": "pkg:deb/debian/keepalived@1:2.2.7-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ks48-yq6s-aue1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.2.7-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926195?format=api", "purl": "pkg:deb/debian/keepalived@1:2.3.3-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.3.3-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926194?format=api", "purl": "pkg:deb/debian/keepalived@1:2.3.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.3.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2018-19045" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-amp5-htt6-1yfm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48680?format=api", "vulnerability_id": "VCID-e88d-2ht5-byab", "summary": "Multiple vulnerabilities have been found in Keepalived, the worst\n of which could allow an attacker to cause Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19046.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19046.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19046", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34716", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34924", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.3495", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.3483", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34875", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34902", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34906", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34869", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34846", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34885", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34868", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34823", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34587", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34567", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.3448", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34355", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19046" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19046", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19046" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1651869", "reference_id": "1651869", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1651869" }, { "reference_url": "https://security.gentoo.org/glsa/201903-01", "reference_id": "GLSA-201903-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201903-01" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/926196?format=api", "purl": "pkg:deb/debian/keepalived@1:2.0.10-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.0.10-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926193?format=api", "purl": "pkg:deb/debian/keepalived@1:2.1.5-0.2%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ks48-yq6s-aue1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.1.5-0.2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926191?format=api", "purl": "pkg:deb/debian/keepalived@1:2.2.7-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ks48-yq6s-aue1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.2.7-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926195?format=api", "purl": "pkg:deb/debian/keepalived@1:2.3.3-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.3.3-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926194?format=api", "purl": "pkg:deb/debian/keepalived@1:2.3.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.3.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2018-19046" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e88d-2ht5-byab" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49806?format=api", "vulnerability_id": "VCID-naqn-kvq6-h7c1", "summary": "Keepalived uses world-writable PID files, allowing a local attacker\n to kill arbitrary processes.", "references": [ { "reference_url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=626281", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=626281" }, { "reference_url": "http://lists.debian.org/debian-security/2011/05/msg00012.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.debian.org/debian-security/2011/05/msg00012.html" }, { "reference_url": "http://lists.debian.org/debian-security/2011/05/msg00013.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.debian.org/debian-security/2011/05/msg00013.html" }, { "reference_url": "http://lists.debian.org/debian-security/2011/05/msg00018.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.debian.org/debian-security/2011/05/msg00018.html" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/05/10/5", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/05/10/5" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/05/16/7", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/05/16/7" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1784", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14134", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14426", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.1449", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.1456", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14368", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14453", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14507", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14455", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14418", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14361", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14252", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14253", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14324", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14355", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.1433", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14271", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1784" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=704039", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=704039" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1784", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1784" }, { "reference_url": "http://secunia.com/advisories/44460", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/44460" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67477", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67477" }, { "reference_url": "http://www.osvdb.org/72380", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.osvdb.org/72380" }, { "reference_url": "http://www.securityfocus.com/bid/47859", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/47859" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=626281", "reference_id": "626281", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=626281" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:0.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:0.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.2.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:0.2.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.2.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.2.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:0.2.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.2.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:0.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:0.3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.3.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:0.3.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.3.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.3.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:0.3.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.3.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.4.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:0.4.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.4.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.4.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:0.4.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.4.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.4.9a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:0.4.9a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.4.9a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.5.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:0.5.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.5.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.5.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:0.5.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.5.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:0.5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.5.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:0.5.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.5.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.5.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:0.5.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.5.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.5.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:0.5.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.5.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:0.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.6.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:0.6.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.6.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:0.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:0.6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.6.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:0.6.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.6.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.6.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:0.6.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.6.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.6.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:0.6.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.6.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.6.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:0.6.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.6.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.6.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:0.6.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.6.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.6.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:0.6.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.6.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.7.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:0.7.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.7.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.7.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:0.7.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:0.7.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:1.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:1.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:1.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:1.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:1.1.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:1.1.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:1.1.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:1.1.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:1.1.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:1.1.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:1.1.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:1.1.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:1.1.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:1.1.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:1.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:1.1.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:1.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:1.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:1.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:1.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:1.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:1.1.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:1.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:1.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:keepalived:keepalived:1.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:keepalived:keepalived:1.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1784", "reference_id": "CVE-2011-1784", "reference_type": "", "scores": [ { "value": "3.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1784" }, { "reference_url": "https://security.gentoo.org/glsa/201207-07", "reference_id": "GLSA-201207-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201207-07" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/926192?format=api", "purl": "pkg:deb/debian/keepalived@1:1.2.2-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:1.2.2-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926193?format=api", "purl": "pkg:deb/debian/keepalived@1:2.1.5-0.2%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ks48-yq6s-aue1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.1.5-0.2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926191?format=api", "purl": "pkg:deb/debian/keepalived@1:2.2.7-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ks48-yq6s-aue1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.2.7-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926195?format=api", "purl": "pkg:deb/debian/keepalived@1:2.3.3-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.3.3-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926194?format=api", "purl": "pkg:deb/debian/keepalived@1:2.3.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.3.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2011-1784" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-naqn-kvq6-h7c1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48677?format=api", "vulnerability_id": "VCID-qp12-vdxh-uqfx", "summary": "Multiple vulnerabilities have been found in Keepalived, the worst\n of which could allow an attacker to cause Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19044.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19044.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19044", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.3081", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30938", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30985", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30802", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.3086", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30891", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30892", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30849", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30804", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30836", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30816", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.3078", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30614", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30498", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30415", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30274", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19044" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19044", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19044" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1651863", "reference_id": "1651863", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1651863" }, { "reference_url": "https://security.gentoo.org/glsa/201903-01", "reference_id": "GLSA-201903-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201903-01" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2285", "reference_id": "RHSA-2019:2285", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2285" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/926196?format=api", "purl": "pkg:deb/debian/keepalived@1:2.0.10-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.0.10-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926193?format=api", "purl": "pkg:deb/debian/keepalived@1:2.1.5-0.2%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ks48-yq6s-aue1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.1.5-0.2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926191?format=api", "purl": "pkg:deb/debian/keepalived@1:2.2.7-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ks48-yq6s-aue1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.2.7-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926195?format=api", "purl": "pkg:deb/debian/keepalived@1:2.3.3-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.3.3-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926194?format=api", "purl": "pkg:deb/debian/keepalived@1:2.3.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.3.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2018-19044" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qp12-vdxh-uqfx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48681?format=api", "vulnerability_id": "VCID-vq7d-sshy-uyft", "summary": "Multiple vulnerabilities have been found in Keepalived, the worst\n of which could allow an attacker to cause Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19115.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19115.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19115", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05682", "scoring_system": "epss", "scoring_elements": "0.90434", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.05682", "scoring_system": "epss", "scoring_elements": "0.9041", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05682", "scoring_system": "epss", "scoring_elements": "0.90424", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.05682", "scoring_system": "epss", "scoring_elements": "0.90421", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.06203", "scoring_system": "epss", "scoring_elements": "0.90835", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06203", "scoring_system": "epss", "scoring_elements": "0.90856", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06203", "scoring_system": "epss", "scoring_elements": "0.90863", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06203", "scoring_system": "epss", "scoring_elements": "0.90872", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.06203", "scoring_system": "epss", "scoring_elements": "0.9087", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06203", "scoring_system": "epss", "scoring_elements": "0.90894", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.06203", "scoring_system": "epss", "scoring_elements": "0.90892", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.06203", "scoring_system": "epss", "scoring_elements": "0.90819", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06203", "scoring_system": "epss", "scoring_elements": "0.90845", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06203", "scoring_system": "epss", "scoring_elements": "0.90825", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19115" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19115", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19115" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1651871", "reference_id": "1651871", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1651871" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914393", "reference_id": "914393", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914393" }, { "reference_url": "https://security.gentoo.org/glsa/201903-01", "reference_id": "GLSA-201903-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201903-01" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:0022", "reference_id": "RHSA-2019:0022", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:0022" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1792", "reference_id": "RHSA-2019:1792", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1792" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1945", "reference_id": "RHSA-2019:1945", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1945" }, { "reference_url": "https://usn.ubuntu.com/3995-1/", "reference_id": "USN-3995-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3995-1/" }, { "reference_url": "https://usn.ubuntu.com/3995-2/", "reference_id": "USN-3995-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3995-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/926196?format=api", "purl": "pkg:deb/debian/keepalived@1:2.0.10-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.0.10-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926193?format=api", "purl": "pkg:deb/debian/keepalived@1:2.1.5-0.2%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ks48-yq6s-aue1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.1.5-0.2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926191?format=api", "purl": "pkg:deb/debian/keepalived@1:2.2.7-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ks48-yq6s-aue1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.2.7-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926195?format=api", "purl": "pkg:deb/debian/keepalived@1:2.3.3-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.3.3-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/926194?format=api", "purl": "pkg:deb/debian/keepalived@1:2.3.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.3.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2018-19115" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vq7d-sshy-uyft" } ], "risk_score": "4.4", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/keepalived@1:2.1.5-0.2%252Bdeb11u1%3Fdistro=trixie" }