Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/112537?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/112537?format=api", "purl": "pkg:rpm/redhat/samba3x@3.6.23-14?arch=el5_11", "type": "rpm", "namespace": "redhat", "name": "samba3x", "version": "3.6.23-14", "qualifiers": { "arch": "el5_11" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46495?format=api", "vulnerability_id": "VCID-a653-r4dy-bba9", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which may allow remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7494.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7494.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7494", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.94176", "scoring_system": "epss", "scoring_elements": "0.99919", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.94176", "scoring_system": "epss", "scoring_elements": "0.99917", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.94176", "scoring_system": "epss", "scoring_elements": "0.9992", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.94176", "scoring_system": "epss", "scoring_elements": "0.99918", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.94245", "scoring_system": "epss", "scoring_elements": "0.99929", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7494" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7494", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7494" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "9", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:C/I:C/A:C" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1038552", "reference_id": "1038552", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:29:34Z/" } ], "url": "http://www.securitytracker.com/id/1038552" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1450347", "reference_id": "1450347", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1450347" }, { "reference_url": "https://www.exploit-db.com/exploits/42060/", "reference_id": "42060", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:29:34Z/" } ], "url": "https://www.exploit-db.com/exploits/42060/" }, { "reference_url": "https://www.exploit-db.com/exploits/42084/", "reference_id": "42084", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:29:34Z/" } ], "url": "https://www.exploit-db.com/exploits/42084/" }, { "reference_url": "http://www.securityfocus.com/bid/98636", "reference_id": "98636", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:29:34Z/" } ], "url": "http://www.securityfocus.com/bid/98636" }, { "reference_url": "https://security.archlinux.org/ASA-201705-22", "reference_id": "ASA-201705-22", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201705-22" }, { "reference_url": "https://security.archlinux.org/AVG-279", "reference_id": "AVG-279", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-279" }, { "reference_url": "https://github.com/rapid7/metasploit-framework/blob/ae22b4ccf4a3dde77ec339d83091b057aa7e9a77/modules/exploits/linux/samba/is_known_pipename.rb", "reference_id": "CVE-2017-7494", "reference_type": "exploit", "scores": [], "url": "https://github.com/rapid7/metasploit-framework/blob/ae22b4ccf4a3dde77ec339d83091b057aa7e9a77/modules/exploits/linux/samba/is_known_pipename.rb" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/42060.py", "reference_id": "CVE-2017-7494", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/42060.py" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/42084.rb", "reference_id": "CVE-2017-7494", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/42084.rb" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2017-7494.html", "reference_id": "CVE-2017-7494.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:29:34Z/" } ], "url": "https://www.samba.org/samba/security/CVE-2017-7494.html" }, { "reference_url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbns03755en_us", "reference_id": "display?docLocale=en_US&docId=emr_na-hpesbns03755en_us", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:29:34Z/" } ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbns03755en_us" }, { "reference_url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03759en_us", "reference_id": "display?docLocale=en_US&docId=emr_na-hpesbux03759en_us", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:29:34Z/" } ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03759en_us" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3860", "reference_id": "dsa-3860", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:29:34Z/" } ], "url": "http://www.debian.org/security/2017/dsa-3860" }, { "reference_url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet&p_File_Name=SEVD-2018-095-01+Security+Notification+Umotion+V1.1.pdf&p_Doc_Ref=SEVD-2018-095-01", "reference_id": "files?p_enDocType=Technical+leaflet&p_File_Name=SEVD-2018-095-01+Security+Notification+Umotion+V1.1.pdf&p_Doc_Ref=SEVD-2018-095-01", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:29:34Z/" } ], "url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet&p_File_Name=SEVD-2018-095-01+Security+Notification+Umotion+V1.1.pdf&p_Doc_Ref=SEVD-2018-095-01" }, { "reference_url": "https://security.gentoo.org/glsa/201805-07", "reference_id": "GLSA-201805-07", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:29:34Z/" } ], "url": "https://security.gentoo.org/glsa/201805-07" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20170524-0001/", "reference_id": "ntap-20170524-0001", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:29:34Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20170524-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1270", "reference_id": "RHSA-2017:1270", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:29:34Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1270" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1271", "reference_id": "RHSA-2017:1271", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:29:34Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1271" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1272", "reference_id": "RHSA-2017:1272", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:29:34Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1272" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1273", "reference_id": "RHSA-2017:1273", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:29:34Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1273" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1390", "reference_id": "RHSA-2017:1390", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:29:34Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1390" }, { "reference_url": "https://usn.ubuntu.com/3296-1/", "reference_id": "USN-3296-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3296-1/" }, { "reference_url": "https://usn.ubuntu.com/3296-2/", "reference_id": "USN-3296-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3296-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-7494" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a653-r4dy-bba9" } ], "fixing_vulnerabilities": [], "risk_score": "10.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/samba3x@3.6.23-14%3Farch=el5_11" }