{"url":"http://public2.vulnerablecode.io/api/packages/126781?format=json","purl":"pkg:rpm/redhat/samba@3.5.6-86.el6_1?arch=4","type":"rpm","namespace":"redhat","name":"samba","version":"3.5.6-86.el6_1","qualifiers":{"arch":"4"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87312?format=json","vulnerability_id":"VCID-3ywg-xum4-hkdq","summary":"(SWAT): Absent CSRF protection in various Samba web configuration formulars","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2522.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2522.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2522","reference_id":"","reference_type":"","scores":[{"value":"0.18197","scoring_system":"epss","scoring_elements":"0.95238","published_at":"2026-05-09T12:55:00Z"},{"value":"0.18197","scoring_system":"epss","scoring_elements":"0.9521","published_at":"2026-04-29T12:55:00Z"},{"value":"0.18197","scoring_system":"epss","scoring_elements":"0.95224","published_at":"2026-05-05T12:55:00Z"},{"value":"0.18197","scoring_system":"epss","scoring_elements":"0.9523","published_at":"2026-05-07T12:55:00Z"},{"value":"0.18197","scoring_system":"epss","scoring_elements":"0.95174","published_at":"2026-04-07T12:55:00Z"},{"value":"0.18197","scoring_system":"epss","scoring_elements":"0.95182","published_at":"2026-04-08T12:55:00Z"},{"value":"0.18197","scoring_system":"epss","scoring_elements":"0.95185","published_at":"2026-04-09T12:55:00Z"},{"value":"0.18197","scoring_system":"epss","scoring_elements":"0.95191","published_at":"2026-04-11T12:55:00Z"},{"value":"0.18197","scoring_system":"epss","scoring_elements":"0.95192","published_at":"2026-04-12T12:55:00Z"},{"value":"0.18197","scoring_system":"epss","scoring_elements":"0.95195","published_at":"2026-04-13T12:55:00Z"},{"value":"0.18197","scoring_system":"epss","scoring_elements":"0.95203","published_at":"2026-04-16T12:55:00Z"},{"value":"0.18197","scoring_system":"epss","scoring_elements":"0.95207","published_at":"2026-04-18T12:55:00Z"},{"value":"0.18197","scoring_system":"epss","scoring_elements":"0.95208","published_at":"2026-04-24T12:55:00Z"},{"value":"0.19243","scoring_system":"epss","scoring_elements":"0.95337","published_at":"2026-04-02T12:55:00Z"},{"value":"0.19243","scoring_system":"epss","scoring_elements":"0.95343","published_at":"2026-04-04T12:55:00Z"},{"value":"0.19243","scoring_system":"epss","scoring_elements":"0.95327","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2522"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2522","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2522"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=721348","reference_id":"721348","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=721348"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/cgi/webapps/17577.txt","reference_id":"CVE-2011-2522;OSVDB-74071","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/cgi/webapps/17577.txt"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1219","reference_id":"RHSA-2011:1219","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1219"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1220","reference_id":"RHSA-2011:1220","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1220"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1221","reference_id":"RHSA-2011:1221","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1221"},{"reference_url":"https://usn.ubuntu.com/1182-1/","reference_id":"USN-1182-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1182-1/"}],"fixed_packages":[],"aliases":["CVE-2011-2522"],"risk_score":0.4,"exploitability":"2.0","weighted_severity":"0.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3ywg-xum4-hkdq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87875?format=json","vulnerability_id":"VCID-mq2v-5khm-yucb","summary":"Samba mtab lock file race condition","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3585.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3585.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3585","reference_id":"","reference_type":"","scores":[{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.33931","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.3391","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.33825","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.33705","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.33774","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.33815","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.67997","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.67984","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.67949","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.67888","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.67999","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.67981","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.67986","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.67911","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.6793","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.67909","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.6796","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.67974","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3585"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3585","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3585"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=742907","reference_id":"742907","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=742907"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1219","reference_id":"RHSA-2011:1219","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1219"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1221","reference_id":"RHSA-2011:1221","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1221"},{"reference_url":"https://usn.ubuntu.com/1226-1/","reference_id":"USN-1226-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1226-1/"}],"fixed_packages":[],"aliases":["CVE-2011-3585"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mq2v-5khm-yucb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32165?format=json","vulnerability_id":"VCID-s238-xmfb-2ueg","summary":"Multiple vulnerabilities have been found in Samba, the worst of\n    which may allow execution of arbitrary code with root privileges.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2724.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2724.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2724","reference_id":"","reference_type":"","scores":[{"value":"0.01116","scoring_system":"epss","scoring_elements":"0.78328","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01116","scoring_system":"epss","scoring_elements":"0.78136","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01116","scoring_system":"epss","scoring_elements":"0.78144","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01116","scoring_system":"epss","scoring_elements":"0.78173","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01116","scoring_system":"epss","scoring_elements":"0.78156","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01116","scoring_system":"epss","scoring_elements":"0.78182","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01116","scoring_system":"epss","scoring_elements":"0.78188","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01116","scoring_system":"epss","scoring_elements":"0.78214","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01116","scoring_system":"epss","scoring_elements":"0.78197","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01116","scoring_system":"epss","scoring_elements":"0.78193","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01116","scoring_system":"epss","scoring_elements":"0.78225","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01116","scoring_system":"epss","scoring_elements":"0.78223","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01116","scoring_system":"epss","scoring_elements":"0.78218","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01116","scoring_system":"epss","scoring_elements":"0.7825","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01116","scoring_system":"epss","scoring_elements":"0.78256","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01116","scoring_system":"epss","scoring_elements":"0.78272","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01116","scoring_system":"epss","scoring_elements":"0.78285","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01116","scoring_system":"epss","scoring_elements":"0.78311","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2724"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2724","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2724"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=726691","reference_id":"726691","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=726691"},{"reference_url":"https://security.gentoo.org/glsa/201206-22","reference_id":"GLSA-201206-22","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201206-22"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1220","reference_id":"RHSA-2011:1220","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1220"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1221","reference_id":"RHSA-2011:1221","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1221"},{"reference_url":"https://usn.ubuntu.com/1226-1/","reference_id":"USN-1226-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1226-1/"},{"reference_url":"https://usn.ubuntu.com/1226-2/","reference_id":"USN-1226-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1226-2/"}],"fixed_packages":[],"aliases":["CVE-2011-2724"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s238-xmfb-2ueg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87313?format=json","vulnerability_id":"VCID-umah-ug4p-9ydh","summary":"(SWAT): XSS flaw in Change Password page","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2694.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2694.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2694","reference_id":"","reference_type":"","scores":[{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.86794","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.86805","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.86824","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.86817","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.86837","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.86845","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.86858","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.86854","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.86849","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.86867","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.86872","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.86873","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.86889","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.86895","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.86897","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.8692","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.86938","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03127","scoring_system":"epss","scoring_elements":"0.86956","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2694"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2694","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2694"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=722537","reference_id":"722537","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=722537"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1219","reference_id":"RHSA-2011:1219","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1219"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1220","reference_id":"RHSA-2011:1220","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1220"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1221","reference_id":"RHSA-2011:1221","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1221"},{"reference_url":"https://usn.ubuntu.com/1182-1/","reference_id":"USN-1182-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1182-1/"}],"fixed_packages":[],"aliases":["CVE-2011-2694"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-umah-ug4p-9ydh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32164?format=json","vulnerability_id":"VCID-vgda-wzbt-fydx","summary":"Multiple vulnerabilities have been found in Samba, the worst of\n    which may allow execution of arbitrary code with root privileges.","references":[{"reference_url":"http://openwall.com/lists/oss-security/2011/03/04/10","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/04/10"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/04/11","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/04/11"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/04/12","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/04/12"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/04/9","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/04/9"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/05/3","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/05/3"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/05/7","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/05/7"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/07/9","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/07/9"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/14/16","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/14/16"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/14/5","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/14/5"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/14/7","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/14/7"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/15/6","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/15/6"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/22/4","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/22/4"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/22/6","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/22/6"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/31/3","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/31/3"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/31/4","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/31/4"},{"reference_url":"http://openwall.com/lists/oss-security/2011/04/01/2","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/04/01/2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1678.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1678.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1678","reference_id":"","reference_type":"","scores":[{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71641","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71455","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71462","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71479","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71452","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71492","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71504","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71526","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71511","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71493","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71539","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71544","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71522","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71573","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71581","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71585","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71571","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71606","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1678"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1678","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1678"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/66702","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/66702"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:148","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:148"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=695925","reference_id":"695925","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=695925"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1678","reference_id":"CVE-2011-1678","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:P/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1678"},{"reference_url":"https://security.gentoo.org/glsa/201206-22","reference_id":"GLSA-201206-22","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201206-22"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1219","reference_id":"RHSA-2011:1219","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1219"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1220","reference_id":"RHSA-2011:1220","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1220"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1221","reference_id":"RHSA-2011:1221","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1221"},{"reference_url":"https://usn.ubuntu.com/1226-1/","reference_id":"USN-1226-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1226-1/"},{"reference_url":"https://usn.ubuntu.com/1226-2/","reference_id":"USN-1226-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1226-2/"}],"fixed_packages":[],"aliases":["CVE-2011-1678"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vgda-wzbt-fydx"}],"fixing_vulnerabilities":[],"risk_score":"1.5","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/samba@3.5.6-86.el6_1%3Farch=4"}