Vulnerability Instance
Lookup for vulnerabilities affecting packages.
GET /api/vulnerabilities/67219?format=api
{ "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67219?format=api", "vulnerability_id": "VCID-j94q-hxyf-eye9", "summary": "haproxy: denial of service vulnerability in HAProxy mjson library", "aliases": [ { "alias": "CVE-2025-11230" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1102939?format=api", "purl": "pkg:deb/debian/haproxy@3.2.17-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/haproxy@3.2.17-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924756?format=api", "purl": "pkg:deb/debian/haproxy@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/haproxy@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924744?format=api", "purl": "pkg:deb/debian/haproxy@2.2.9-2%2Bdeb11u6?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-97wa-uwp2-57gu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/haproxy@2.2.9-2%252Bdeb11u6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924742?format=api", "purl": "pkg:deb/debian/haproxy@2.6.12-1%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7mfq-cvmr-nbf8" }, { "vulnerability": "VCID-97wa-uwp2-57gu" }, { "vulnerability": "VCID-rj2h-pnmf-mufp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/haproxy@2.6.12-1%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924776?format=api", "purl": "pkg:deb/debian/haproxy@3.0.11-1%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/haproxy@3.0.11-1%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924746?format=api", "purl": "pkg:deb/debian/haproxy@3.0.11-1%2Bdeb13u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-97wa-uwp2-57gu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/haproxy@3.0.11-1%252Bdeb13u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924775?format=api", "purl": "pkg:deb/debian/haproxy@3.2.5-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/haproxy@3.2.5-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924745?format=api", "purl": "pkg:deb/debian/haproxy@3.2.15-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/haproxy@3.2.15-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1077440?format=api", "purl": "pkg:deb/debian/haproxy@3.2.16-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/haproxy@3.2.16-1%3Fdistro=trixie" } ], "affected_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/88575?format=api", "purl": "pkg:rpm/redhat/haproxy@2.4.7-2.el9_0?arch=3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-j94q-hxyf-eye9" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/haproxy@2.4.7-2.el9_0%3Farch=3" }, { "url": "http://public2.vulnerablecode.io/api/packages/88573?format=api", "purl": "pkg:rpm/redhat/haproxy@2.4.17-6.el9_2?arch=3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-j94q-hxyf-eye9" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/haproxy@2.4.17-6.el9_2%3Farch=3" }, { "url": "http://public2.vulnerablecode.io/api/packages/88576?format=api", "purl": "pkg:rpm/redhat/haproxy@2.4.22-3.el9_4?arch=1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-j94q-hxyf-eye9" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/haproxy@2.4.22-3.el9_4%3Farch=1" }, { "url": "http://public2.vulnerablecode.io/api/packages/88574?format=api", "purl": "pkg:rpm/redhat/haproxy@2.4.22-4.el9_6?arch=1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-j94q-hxyf-eye9" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/haproxy@2.4.22-4.el9_6%3Farch=1" }, { "url": "http://public2.vulnerablecode.io/api/packages/88571?format=api", "purl": "pkg:rpm/redhat/haproxy@2.8.14-1.el9_7?arch=1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-j94q-hxyf-eye9" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/haproxy@2.8.14-1.el9_7%3Farch=1" }, { "url": "http://public2.vulnerablecode.io/api/packages/88572?format=api", "purl": "pkg:rpm/redhat/haproxy@3.0.5-4.el10_0?arch=1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-j94q-hxyf-eye9" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/haproxy@3.0.5-4.el10_0%3Farch=1" }, { "url": "http://public2.vulnerablecode.io/api/packages/88570?format=api", "purl": "pkg:rpm/redhat/haproxy@3.0.5-4.el10_1?arch=1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-j94q-hxyf-eye9" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/haproxy@3.0.5-4.el10_1%3Farch=1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1073114?format=api", "purl": "pkg:rpm/redhat/haproxy-main@3.0.19-1?arch=hum1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-j94q-hxyf-eye9" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/haproxy-main@3.0.19-1%3Farch=hum1" } ], "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11230.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11230.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-11230", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60343", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60372", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60357", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60382", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0041", "scoring_system": "epss", "scoring_elements": "0.61368", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0041", "scoring_system": "epss", "scoring_elements": "0.61375", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0041", "scoring_system": "epss", "scoring_elements": "0.61356", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0041", "scoring_system": "epss", "scoring_elements": "0.61395", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0041", "scoring_system": "epss", "scoring_elements": "0.61389", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0041", "scoring_system": "epss", "scoring_elements": "0.61309", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0041", "scoring_system": "epss", "scoring_elements": "0.61338", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0041", "scoring_system": "epss", "scoring_elements": "0.61306", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0041", "scoring_system": "epss", "scoring_elements": "0.61353", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00468", "scoring_system": "epss", "scoring_elements": "0.64545", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00468", "scoring_system": "epss", "scoring_elements": "0.64519", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-11230" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2413003", "reference_id": "2413003", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2413003" }, { "reference_url": "https://www.haproxy.com/blog/october-2025-cve-2025-11230-haproxy-mjson-library-denial-of-service-vulnerability", "reference_id": "october-2025-cve-2025-11230-haproxy-mjson-library-denial-of-service-vulnerability", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-19T17:06:27Z/" } ], "url": "https://www.haproxy.com/blog/october-2025-cve-2025-11230-haproxy-mjson-library-denial-of-service-vulnerability" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21691", "reference_id": "RHSA-2025:21691", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21691" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21692", "reference_id": "RHSA-2025:21692", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21692" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21693", "reference_id": "RHSA-2025:21693", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21693" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21694", "reference_id": "RHSA-2025:21694", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21694" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22398", "reference_id": "RHSA-2025:22398", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22398" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22399", "reference_id": "RHSA-2025:22399", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22399" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22422", "reference_id": "RHSA-2025:22422", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22422" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22548", "reference_id": "RHSA-2025:22548", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22548" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8729", "reference_id": "RHSA-2026:8729", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8729" }, { "reference_url": "https://usn.ubuntu.com/7805-1/", "reference_id": "USN-7805-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7805-1/" } ], "weaknesses": [ { "cwe_id": 407, "name": "Inefficient Algorithmic Complexity", "description": "An algorithm in a product has an inefficient worst-case computational complexity that may be detrimental to system performance and can be triggered by an attacker, typically using crafted manipulations that ensure that the worst case is being reached." } ], "exploits": [], "severity_range_score": "5.3 - 7.5", "exploitability": "0.5", "weighted_severity": "6.8", "risk_score": 3.4, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j94q-hxyf-eye9" }