Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/126780?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/126780?format=api", "purl": "pkg:rpm/redhat/cifs-utils@4.8.1-2.el6_1?arch=2", "type": "rpm", "namespace": "redhat", "name": "cifs-utils", "version": "4.8.1-2.el6_1", "qualifiers": { "arch": "2" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87312?format=api", "vulnerability_id": "VCID-3ywg-xum4-hkdq", "summary": "(SWAT): Absent CSRF protection in various Samba web configuration formulars", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2522.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2522.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2522", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.18197", "scoring_system": "epss", "scoring_elements": "0.95238", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.18197", "scoring_system": "epss", "scoring_elements": "0.9521", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.18197", "scoring_system": "epss", "scoring_elements": "0.95224", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.18197", "scoring_system": "epss", "scoring_elements": "0.9523", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.18197", "scoring_system": "epss", "scoring_elements": "0.95174", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.18197", "scoring_system": "epss", "scoring_elements": "0.95182", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.18197", "scoring_system": "epss", "scoring_elements": "0.95185", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.18197", "scoring_system": "epss", "scoring_elements": "0.95191", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.18197", "scoring_system": "epss", "scoring_elements": "0.95192", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.18197", "scoring_system": "epss", "scoring_elements": "0.95195", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.18197", "scoring_system": "epss", "scoring_elements": "0.95203", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.18197", "scoring_system": "epss", "scoring_elements": "0.95207", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.18197", "scoring_system": "epss", "scoring_elements": "0.95208", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.19243", "scoring_system": "epss", "scoring_elements": "0.95337", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.19243", "scoring_system": "epss", "scoring_elements": "0.95343", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.19243", "scoring_system": "epss", "scoring_elements": "0.95327", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2522" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2522", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2522" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=721348", "reference_id": "721348", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=721348" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/cgi/webapps/17577.txt", "reference_id": "CVE-2011-2522;OSVDB-74071", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/cgi/webapps/17577.txt" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1219", "reference_id": "RHSA-2011:1219", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1219" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1220", "reference_id": "RHSA-2011:1220", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1220" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1221", "reference_id": "RHSA-2011:1221", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1221" }, { "reference_url": "https://usn.ubuntu.com/1182-1/", "reference_id": "USN-1182-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1182-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-2522" ], "risk_score": 0.4, "exploitability": "2.0", "weighted_severity": "0.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3ywg-xum4-hkdq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87875?format=api", "vulnerability_id": "VCID-mq2v-5khm-yucb", "summary": "Samba mtab lock file race condition", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3585.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3585.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3585", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.33931", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.3391", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.33825", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.33705", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.33774", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.33815", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0055", "scoring_system": "epss", "scoring_elements": "0.67997", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0055", "scoring_system": "epss", "scoring_elements": "0.67984", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0055", "scoring_system": "epss", "scoring_elements": "0.67949", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0055", "scoring_system": "epss", "scoring_elements": "0.67888", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0055", "scoring_system": "epss", "scoring_elements": "0.67999", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0055", "scoring_system": "epss", "scoring_elements": "0.67981", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0055", "scoring_system": "epss", "scoring_elements": "0.67986", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0055", "scoring_system": "epss", "scoring_elements": "0.67911", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0055", "scoring_system": "epss", "scoring_elements": "0.6793", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0055", "scoring_system": "epss", "scoring_elements": "0.67909", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0055", "scoring_system": "epss", "scoring_elements": "0.6796", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0055", "scoring_system": "epss", "scoring_elements": "0.67974", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3585" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=742907", "reference_id": "742907", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=742907" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1219", "reference_id": "RHSA-2011:1219", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1219" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1221", "reference_id": "RHSA-2011:1221", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1221" }, { "reference_url": "https://usn.ubuntu.com/1226-1/", "reference_id": "USN-1226-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1226-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-3585" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mq2v-5khm-yucb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32165?format=api", "vulnerability_id": "VCID-s238-xmfb-2ueg", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which may allow execution of arbitrary code with root privileges.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2724.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2724.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2724", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01116", "scoring_system": "epss", "scoring_elements": "0.78328", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01116", "scoring_system": "epss", "scoring_elements": "0.78136", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01116", "scoring_system": "epss", "scoring_elements": "0.78144", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01116", "scoring_system": "epss", "scoring_elements": "0.78173", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01116", "scoring_system": "epss", "scoring_elements": "0.78156", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01116", "scoring_system": "epss", "scoring_elements": "0.78182", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01116", "scoring_system": "epss", "scoring_elements": "0.78188", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01116", "scoring_system": "epss", "scoring_elements": "0.78214", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01116", "scoring_system": "epss", "scoring_elements": "0.78197", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01116", "scoring_system": "epss", "scoring_elements": "0.78193", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01116", "scoring_system": "epss", "scoring_elements": "0.78225", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01116", "scoring_system": "epss", "scoring_elements": "0.78223", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01116", "scoring_system": "epss", "scoring_elements": "0.78218", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01116", "scoring_system": "epss", "scoring_elements": "0.7825", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01116", "scoring_system": "epss", "scoring_elements": "0.78256", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01116", "scoring_system": "epss", "scoring_elements": "0.78272", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01116", "scoring_system": "epss", "scoring_elements": "0.78285", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01116", "scoring_system": "epss", "scoring_elements": "0.78311", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2724" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2724", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2724" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=726691", "reference_id": "726691", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=726691" }, { "reference_url": "https://security.gentoo.org/glsa/201206-22", "reference_id": "GLSA-201206-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201206-22" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1220", "reference_id": "RHSA-2011:1220", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1220" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1221", "reference_id": "RHSA-2011:1221", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1221" }, { "reference_url": "https://usn.ubuntu.com/1226-1/", "reference_id": "USN-1226-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1226-1/" }, { "reference_url": "https://usn.ubuntu.com/1226-2/", "reference_id": "USN-1226-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1226-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-2724" ], "risk_score": 0.9, "exploitability": "0.5", "weighted_severity": "1.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s238-xmfb-2ueg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87313?format=api", "vulnerability_id": "VCID-umah-ug4p-9ydh", "summary": "(SWAT): XSS flaw in Change Password page", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2694.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2694.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2694", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03127", "scoring_system": "epss", "scoring_elements": "0.86794", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03127", "scoring_system": "epss", "scoring_elements": "0.86805", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03127", "scoring_system": "epss", "scoring_elements": "0.86824", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03127", "scoring_system": "epss", "scoring_elements": "0.86817", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03127", "scoring_system": "epss", "scoring_elements": "0.86837", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03127", "scoring_system": "epss", "scoring_elements": "0.86845", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03127", "scoring_system": "epss", "scoring_elements": "0.86858", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03127", "scoring_system": "epss", "scoring_elements": "0.86854", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03127", "scoring_system": "epss", "scoring_elements": "0.86849", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03127", "scoring_system": "epss", "scoring_elements": "0.86867", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03127", "scoring_system": "epss", "scoring_elements": "0.86872", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03127", "scoring_system": "epss", "scoring_elements": "0.86873", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03127", "scoring_system": "epss", "scoring_elements": "0.86889", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03127", "scoring_system": "epss", "scoring_elements": "0.86895", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.03127", "scoring_system": "epss", "scoring_elements": "0.86897", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.03127", "scoring_system": "epss", "scoring_elements": "0.8692", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.03127", "scoring_system": "epss", "scoring_elements": "0.86938", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.03127", "scoring_system": "epss", "scoring_elements": "0.86956", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2694" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2694", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2694" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=722537", "reference_id": "722537", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=722537" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1219", "reference_id": "RHSA-2011:1219", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1219" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1220", "reference_id": "RHSA-2011:1220", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1220" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1221", "reference_id": "RHSA-2011:1221", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1221" }, { "reference_url": "https://usn.ubuntu.com/1182-1/", "reference_id": "USN-1182-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1182-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-2694" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-umah-ug4p-9ydh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32164?format=api", "vulnerability_id": "VCID-vgda-wzbt-fydx", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which may allow execution of arbitrary code with root privileges.", "references": [ { "reference_url": "http://openwall.com/lists/oss-security/2011/03/04/10", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/03/04/10" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/03/04/11", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/03/04/11" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/03/04/12", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/03/04/12" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/03/04/9", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/03/04/9" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/03/05/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/03/05/3" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/03/05/7", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/03/05/7" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/03/07/9", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/03/07/9" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/03/14/16", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/03/14/16" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/03/14/5", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/03/14/5" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/03/14/7", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/03/14/7" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/03/15/6", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/03/15/6" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/03/22/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/03/22/4" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/03/22/6", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/03/22/6" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/03/31/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/03/31/3" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/03/31/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/03/31/4" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/04/01/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/04/01/2" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1678.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1678.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1678", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00677", "scoring_system": "epss", "scoring_elements": "0.71641", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00677", "scoring_system": "epss", "scoring_elements": "0.71455", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00677", "scoring_system": "epss", "scoring_elements": "0.71462", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00677", "scoring_system": "epss", "scoring_elements": "0.71479", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00677", "scoring_system": "epss", "scoring_elements": "0.71452", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00677", "scoring_system": "epss", "scoring_elements": "0.71492", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00677", "scoring_system": "epss", "scoring_elements": "0.71504", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00677", "scoring_system": "epss", "scoring_elements": "0.71526", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00677", "scoring_system": "epss", "scoring_elements": "0.71511", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00677", "scoring_system": "epss", "scoring_elements": "0.71493", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00677", "scoring_system": "epss", "scoring_elements": "0.71539", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00677", "scoring_system": "epss", "scoring_elements": "0.71544", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00677", "scoring_system": "epss", "scoring_elements": "0.71522", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00677", "scoring_system": "epss", "scoring_elements": "0.71573", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00677", "scoring_system": "epss", "scoring_elements": "0.71581", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00677", "scoring_system": "epss", "scoring_elements": "0.71585", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00677", "scoring_system": "epss", "scoring_elements": "0.71571", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00677", "scoring_system": "epss", "scoring_elements": "0.71606", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1678" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1678", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1678" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66702", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66702" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:148", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:148" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=695925", "reference_id": "695925", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=695925" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1678", "reference_id": "CVE-2011-1678", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:P/I:P/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1678" }, { "reference_url": "https://security.gentoo.org/glsa/201206-22", "reference_id": "GLSA-201206-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201206-22" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1219", "reference_id": "RHSA-2011:1219", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1219" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1220", "reference_id": "RHSA-2011:1220", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1220" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1221", "reference_id": "RHSA-2011:1221", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1221" }, { "reference_url": "https://usn.ubuntu.com/1226-1/", "reference_id": "USN-1226-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1226-1/" }, { "reference_url": "https://usn.ubuntu.com/1226-2/", "reference_id": "USN-1226-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1226-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-1678" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vgda-wzbt-fydx" } ], "fixing_vulnerabilities": [], "risk_score": "1.5", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/cifs-utils@4.8.1-2.el6_1%3Farch=2" }