Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/ntpsec@1.1.3-r0?arch=x86_64&distroversion=edge&reponame=community
Typeapk
Namespacealpine
Namentpsec
Version1.1.3-r0
Qualifiers
arch x86_64
distroversion edge
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.2.1-r0
Latest_non_vulnerable_version1.2.2a-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-d27b-a6y5-ybfw
vulnerability_id VCID-d27b-a6y5-ybfw
summary An issue was discovered in NTPsec before 1.1.3. Because of a bug in ctl_getitem, there is a stack-based buffer over-read in read_sysvars in ntp_control.c in ntpd.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-6443
reference_id
reference_type
scores
0
value 0.43948
scoring_system epss
scoring_elements 0.97549
published_at 2026-04-29T12:55:00Z
1
value 0.43948
scoring_system epss
scoring_elements 0.97546
published_at 2026-04-26T12:55:00Z
2
value 0.43948
scoring_system epss
scoring_elements 0.97511
published_at 2026-04-01T12:55:00Z
3
value 0.43948
scoring_system epss
scoring_elements 0.97518
published_at 2026-04-02T12:55:00Z
4
value 0.43948
scoring_system epss
scoring_elements 0.9752
published_at 2026-04-04T12:55:00Z
5
value 0.43948
scoring_system epss
scoring_elements 0.97522
published_at 2026-04-07T12:55:00Z
6
value 0.43948
scoring_system epss
scoring_elements 0.97528
published_at 2026-04-08T12:55:00Z
7
value 0.43948
scoring_system epss
scoring_elements 0.97529
published_at 2026-04-09T12:55:00Z
8
value 0.43948
scoring_system epss
scoring_elements 0.97533
published_at 2026-04-11T12:55:00Z
9
value 0.43948
scoring_system epss
scoring_elements 0.97535
published_at 2026-04-13T12:55:00Z
10
value 0.43948
scoring_system epss
scoring_elements 0.97544
published_at 2026-04-16T12:55:00Z
11
value 0.43948
scoring_system epss
scoring_elements 0.97545
published_at 2026-04-18T12:55:00Z
12
value 0.43948
scoring_system epss
scoring_elements 0.97547
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-6443
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6443
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6443
2
reference_url https://dumpco.re/blog/ntpsec-bugs
reference_id
reference_type
scores
url https://dumpco.re/blog/ntpsec-bugs
3
reference_url https://github.com/ntpsec/ntpsec/blob/NTPsec_1_1_3/NEWS
reference_id
reference_type
scores
url https://github.com/ntpsec/ntpsec/blob/NTPsec_1_1_3/NEWS
4
reference_url https://www.exploit-db.com/exploits/46175/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/46175/
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=919513
reference_id 919513
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=919513
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ntpsec:ntpsec:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ntpsec:ntpsec:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ntpsec:ntpsec:*:*:*:*:*:*:*:*
7
reference_url https://dumpco.re/bugs/ntpsec-oobread1
reference_id CVE-2019-6443
reference_type exploit
scores
url https://dumpco.re/bugs/ntpsec-oobread1
8
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/46175.py
reference_id CVE-2019-6443
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/46175.py
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-6443
reference_id CVE-2019-6443
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:P
1
value 9.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-6443
fixed_packages
0
url pkg:apk/alpine/ntpsec@1.1.3-r0?arch=x86_64&distroversion=edge&reponame=community
purl pkg:apk/alpine/ntpsec@1.1.3-r0?arch=x86_64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/ntpsec@1.1.3-r0%3Farch=x86_64&distroversion=edge&reponame=community
aliases CVE-2019-6443
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d27b-a6y5-ybfw
1
url VCID-qpfz-2p88-w7gr
vulnerability_id VCID-qpfz-2p88-w7gr
summary An issue was discovered in NTPsec before 1.1.3. process_control() in ntp_control.c has a stack-based buffer over-read because attacker-controlled data is dereferenced by ntohl() in ntpd.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-6444
reference_id
reference_type
scores
0
value 0.12577
scoring_system epss
scoring_elements 0.93974
published_at 2026-04-29T12:55:00Z
1
value 0.12577
scoring_system epss
scoring_elements 0.93975
published_at 2026-04-24T12:55:00Z
2
value 0.12577
scoring_system epss
scoring_elements 0.93914
published_at 2026-04-01T12:55:00Z
3
value 0.12577
scoring_system epss
scoring_elements 0.93923
published_at 2026-04-02T12:55:00Z
4
value 0.12577
scoring_system epss
scoring_elements 0.93931
published_at 2026-04-04T12:55:00Z
5
value 0.12577
scoring_system epss
scoring_elements 0.93935
published_at 2026-04-07T12:55:00Z
6
value 0.12577
scoring_system epss
scoring_elements 0.93944
published_at 2026-04-08T12:55:00Z
7
value 0.12577
scoring_system epss
scoring_elements 0.93947
published_at 2026-04-09T12:55:00Z
8
value 0.12577
scoring_system epss
scoring_elements 0.9395
published_at 2026-04-13T12:55:00Z
9
value 0.12577
scoring_system epss
scoring_elements 0.93966
published_at 2026-04-16T12:55:00Z
10
value 0.12577
scoring_system epss
scoring_elements 0.93972
published_at 2026-04-18T12:55:00Z
11
value 0.12577
scoring_system epss
scoring_elements 0.93973
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-6444
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6444
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6444
2
reference_url https://dumpco.re/blog/ntpsec-bugs
reference_id
reference_type
scores
url https://dumpco.re/blog/ntpsec-bugs
3
reference_url https://github.com/ntpsec/ntpsec/blob/NTPsec_1_1_3/NEWS
reference_id
reference_type
scores
url https://github.com/ntpsec/ntpsec/blob/NTPsec_1_1_3/NEWS
4
reference_url https://www.exploit-db.com/exploits/46176/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/46176/
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=919513
reference_id 919513
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=919513
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ntpsec:ntpsec:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ntpsec:ntpsec:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ntpsec:ntpsec:*:*:*:*:*:*:*:*
7
reference_url https://dumpco.re/bugs/ntpsec-oobread2
reference_id CVE-2019-6444
reference_type exploit
scores
url https://dumpco.re/bugs/ntpsec-oobread2
8
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/46176.py
reference_id CVE-2019-6444
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/46176.py
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-6444
reference_id CVE-2019-6444
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:P
1
value 9.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-6444
fixed_packages
0
url pkg:apk/alpine/ntpsec@1.1.3-r0?arch=x86_64&distroversion=edge&reponame=community
purl pkg:apk/alpine/ntpsec@1.1.3-r0?arch=x86_64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/ntpsec@1.1.3-r0%3Farch=x86_64&distroversion=edge&reponame=community
aliases CVE-2019-6444
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qpfz-2p88-w7gr
2
url VCID-tdmu-hs1x-8fhe
vulnerability_id VCID-tdmu-hs1x-8fhe
summary An issue was discovered in NTPsec before 1.1.3. An authenticated attacker can write one byte out of bounds in ntpd via a malformed config request, related to config_remotely in ntp_config.c, yyparse in ntp_parser.tab.c, and yyerror in ntp_parser.y.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-6442
reference_id
reference_type
scores
0
value 0.10199
scoring_system epss
scoring_elements 0.93162
published_at 2026-04-29T12:55:00Z
1
value 0.10199
scoring_system epss
scoring_elements 0.93165
published_at 2026-04-26T12:55:00Z
2
value 0.10199
scoring_system epss
scoring_elements 0.93101
published_at 2026-04-01T12:55:00Z
3
value 0.10199
scoring_system epss
scoring_elements 0.93111
published_at 2026-04-02T12:55:00Z
4
value 0.10199
scoring_system epss
scoring_elements 0.93114
published_at 2026-04-04T12:55:00Z
5
value 0.10199
scoring_system epss
scoring_elements 0.93113
published_at 2026-04-07T12:55:00Z
6
value 0.10199
scoring_system epss
scoring_elements 0.93122
published_at 2026-04-08T12:55:00Z
7
value 0.10199
scoring_system epss
scoring_elements 0.93126
published_at 2026-04-09T12:55:00Z
8
value 0.10199
scoring_system epss
scoring_elements 0.93132
published_at 2026-04-11T12:55:00Z
9
value 0.10199
scoring_system epss
scoring_elements 0.93129
published_at 2026-04-12T12:55:00Z
10
value 0.10199
scoring_system epss
scoring_elements 0.93131
published_at 2026-04-13T12:55:00Z
11
value 0.10199
scoring_system epss
scoring_elements 0.93148
published_at 2026-04-16T12:55:00Z
12
value 0.10199
scoring_system epss
scoring_elements 0.93152
published_at 2026-04-18T12:55:00Z
13
value 0.10199
scoring_system epss
scoring_elements 0.9316
published_at 2026-04-21T12:55:00Z
14
value 0.10199
scoring_system epss
scoring_elements 0.93166
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-6442
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6442
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6442
2
reference_url https://dumpco.re/blog/ntpsec-bugs
reference_id
reference_type
scores
url https://dumpco.re/blog/ntpsec-bugs
3
reference_url https://github.com/ntpsec/ntpsec/blob/NTPsec_1_1_3/NEWS
reference_id
reference_type
scores
url https://github.com/ntpsec/ntpsec/blob/NTPsec_1_1_3/NEWS
4
reference_url https://www.exploit-db.com/exploits/46178/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/46178/
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=919513
reference_id 919513
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=919513
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ntpsec:ntpsec:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ntpsec:ntpsec:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ntpsec:ntpsec:*:*:*:*:*:*:*:*
7
reference_url https://dumpco.re/bugs/ntpsec-authed-oobwrite
reference_id CVE-2019-6442
reference_type exploit
scores
url https://dumpco.re/bugs/ntpsec-authed-oobwrite
8
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/46178.py
reference_id CVE-2019-6442
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/46178.py
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-6442
reference_id CVE-2019-6442
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-6442
fixed_packages
0
url pkg:apk/alpine/ntpsec@1.1.3-r0?arch=x86_64&distroversion=edge&reponame=community
purl pkg:apk/alpine/ntpsec@1.1.3-r0?arch=x86_64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/ntpsec@1.1.3-r0%3Farch=x86_64&distroversion=edge&reponame=community
aliases CVE-2019-6442
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tdmu-hs1x-8fhe
3
url VCID-upjp-hfwn-hkg5
vulnerability_id VCID-upjp-hfwn-hkg5
summary An issue was discovered in NTPsec before 1.1.3. An authenticated attacker can cause a NULL pointer dereference and ntpd crash in ntp_control.c, related to ctl_getitem.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-6445
reference_id
reference_type
scores
0
value 0.06937
scoring_system epss
scoring_elements 0.9145
published_at 2026-04-29T12:55:00Z
1
value 0.06937
scoring_system epss
scoring_elements 0.91451
published_at 2026-04-26T12:55:00Z
2
value 0.06937
scoring_system epss
scoring_elements 0.91374
published_at 2026-04-01T12:55:00Z
3
value 0.06937
scoring_system epss
scoring_elements 0.91379
published_at 2026-04-02T12:55:00Z
4
value 0.06937
scoring_system epss
scoring_elements 0.9139
published_at 2026-04-04T12:55:00Z
5
value 0.06937
scoring_system epss
scoring_elements 0.91397
published_at 2026-04-07T12:55:00Z
6
value 0.06937
scoring_system epss
scoring_elements 0.91409
published_at 2026-04-08T12:55:00Z
7
value 0.06937
scoring_system epss
scoring_elements 0.91416
published_at 2026-04-09T12:55:00Z
8
value 0.06937
scoring_system epss
scoring_elements 0.91422
published_at 2026-04-11T12:55:00Z
9
value 0.06937
scoring_system epss
scoring_elements 0.91425
published_at 2026-04-12T12:55:00Z
10
value 0.06937
scoring_system epss
scoring_elements 0.91424
published_at 2026-04-13T12:55:00Z
11
value 0.06937
scoring_system epss
scoring_elements 0.91448
published_at 2026-04-16T12:55:00Z
12
value 0.06937
scoring_system epss
scoring_elements 0.91443
published_at 2026-04-18T12:55:00Z
13
value 0.06937
scoring_system epss
scoring_elements 0.91444
published_at 2026-04-21T12:55:00Z
14
value 0.06937
scoring_system epss
scoring_elements 0.91454
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-6445
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6445
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6445
2
reference_url https://dumpco.re/blog/ntpsec-bugs
reference_id
reference_type
scores
url https://dumpco.re/blog/ntpsec-bugs
3
reference_url https://github.com/ntpsec/ntpsec/blob/NTPsec_1_1_3/NEWS
reference_id
reference_type
scores
url https://github.com/ntpsec/ntpsec/blob/NTPsec_1_1_3/NEWS
4
reference_url https://www.exploit-db.com/exploits/46177/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/46177/
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=919513
reference_id 919513
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=919513
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ntpsec:ntpsec:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ntpsec:ntpsec:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ntpsec:ntpsec:*:*:*:*:*:*:*:*
7
reference_url https://dumpco.re/bugs/ntpsec-authed-npe
reference_id CVE-2019-6445
reference_type exploit
scores
url https://dumpco.re/bugs/ntpsec-authed-npe
8
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/46177.py
reference_id CVE-2019-6445
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/46177.py
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-6445
reference_id CVE-2019-6445
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-6445
fixed_packages
0
url pkg:apk/alpine/ntpsec@1.1.3-r0?arch=x86_64&distroversion=edge&reponame=community
purl pkg:apk/alpine/ntpsec@1.1.3-r0?arch=x86_64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/ntpsec@1.1.3-r0%3Farch=x86_64&distroversion=edge&reponame=community
aliases CVE-2019-6445
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-upjp-hfwn-hkg5
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/ntpsec@1.1.3-r0%3Farch=x86_64&distroversion=edge&reponame=community