Vulnerability Instance
Lookup for vulnerabilities affecting packages.
GET /api/vulnerabilities/14933?format=api
{ "url": "http://public2.vulnerablecode.io/api/vulnerabilities/14933?format=api", "vulnerability_id": "VCID-xu4e-svgd-cygq", "summary": "Improper Input Validation\nOpen redirect vulnerability in the Calendar set page in Moodle 2.1.x before 2.1.3 allows remote authenticated users to redirect users to arbitrary web sites and conduct phishing attacks via a redirection URL.", "aliases": [ { "alias": "CVE-2011-4582" }, { "alias": "GHSA-jcrj-x36p-h9f6" } ], "fixed_packages": [], "affected_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/49935?format=api", "purl": "pkg:composer/moodle/moodle@2.1.0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1m87-uyah-9kat" }, { "vulnerability": "VCID-364d-q9tm-4ket" }, { "vulnerability": "VCID-5vy6-nqht-hfa5" }, { "vulnerability": "VCID-7see-ex7a-9fdr" }, { "vulnerability": "VCID-8q6b-cnmp-n3gv" }, { "vulnerability": "VCID-du8m-h228-cff3" }, { "vulnerability": "VCID-e1jc-m337-k7bj" }, { "vulnerability": "VCID-hxhr-sxkm-nka6" }, { "vulnerability": "VCID-kdqf-c5py-sybt" }, { "vulnerability": "VCID-pj1q-4uex-e3d3" }, { "vulnerability": "VCID-pswr-m2yd-tkfb" }, { "vulnerability": "VCID-qjdf-s39r-5bdb" }, { "vulnerability": "VCID-t242-kuj7-zfg4" }, { "vulnerability": "VCID-t5ww-gsnd-3ycg" }, { "vulnerability": "VCID-u9f3-sbjk-pygw" }, { "vulnerability": "VCID-uhws-64fm-hybk" }, { "vulnerability": "VCID-vf82-m9gw-kud2" }, { "vulnerability": "VCID-xu4e-svgd-cygq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:composer/moodle/moodle@2.1.0" } ], "references": [ { "reference_url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-28720&sr=1", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-28720&sr=1" }, { "reference_url": "http://moodle.org/mod/forum/discuss.php?d=191748", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://moodle.org/mod/forum/discuss.php?d=191748" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4582", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.36701", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.36997", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.37011", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.37019", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.36984", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.36958", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.37003", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.36985", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.36926", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.36916", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.37086", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.37119", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.36946", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4582" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=761248", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=761248" }, { "reference_url": "https://github.com/moodle/moodle", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/moodle/moodle" }, { "reference_url": "https://github.com/moodle/moodle/commit/0d2672748c00181d9cdae2aabbab916cbd64c47d", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/moodle/moodle/commit/0d2672748c00181d9cdae2aabbab916cbd64c47d" }, { "reference_url": "https://github.com/moodle/moodle/commit/21e7d4c5fc9cc5df54c9c7d82190f1339d163a9e", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/moodle/moodle/commit/21e7d4c5fc9cc5df54c9c7d82190f1339d163a9e" }, { "reference_url": "https://github.com/moodle/moodle/commit/7f422374c101dcb0affdd5127b855671af4f3748", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/moodle/moodle/commit/7f422374c101dcb0affdd5127b855671af4f3748" }, { "reference_url": "https://github.com/moodle/moodle/commit/eb59a448f7879d69b21fcde7f1fcddd69655e045", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/moodle/moodle/commit/eb59a448f7879d69b21fcde7f1fcddd69655e045" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4582", "reference_id": "CVE-2011-4582", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4582" }, { "reference_url": "https://github.com/advisories/GHSA-jcrj-x36p-h9f6", "reference_id": "GHSA-jcrj-x36p-h9f6", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-jcrj-x36p-h9f6" } ], "weaknesses": [ { "cwe_id": 1035, "name": "OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities", "description": "Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017." }, { "cwe_id": 20, "name": "Improper Input Validation", "description": "The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly." }, { "cwe_id": 937, "name": "OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities", "description": "Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013." }, { "cwe_id": 601, "name": "URL Redirection to Untrusted Site ('Open Redirect')", "description": "A web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect. This simplifies phishing attacks." } ], "exploits": [], "severity_range_score": "4.0 - 6.9", "exploitability": "0.5", "weighted_severity": "6.2", "risk_score": 3.1, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xu4e-svgd-cygq" }