Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/ldb@2:1.5.1%2Breally1.4.6-3%2Bdeb10u1
Typedeb
Namespacedebian
Nameldb
Version2:1.5.1+really1.4.6-3+deb10u1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2:2.2.3-2~deb11u2
Latest_non_vulnerable_version2:2.2.3-2~deb11u2
Affected_by_vulnerabilities
0
url VCID-28rq-1d68-4bfz
vulnerability_id VCID-28rq-1d68-4bfz
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27840.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27840.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-27840
reference_id
reference_type
scores
0
value 0.14523
scoring_system epss
scoring_elements 0.94417
published_at 2026-04-01T12:55:00Z
1
value 0.14523
scoring_system epss
scoring_elements 0.94477
published_at 2026-04-21T12:55:00Z
2
value 0.14523
scoring_system epss
scoring_elements 0.94455
published_at 2026-04-13T12:55:00Z
3
value 0.14523
scoring_system epss
scoring_elements 0.94469
published_at 2026-04-16T12:55:00Z
4
value 0.14523
scoring_system epss
scoring_elements 0.94474
published_at 2026-04-18T12:55:00Z
5
value 0.14523
scoring_system epss
scoring_elements 0.94424
published_at 2026-04-02T12:55:00Z
6
value 0.14523
scoring_system epss
scoring_elements 0.94435
published_at 2026-04-04T12:55:00Z
7
value 0.14523
scoring_system epss
scoring_elements 0.94437
published_at 2026-04-07T12:55:00Z
8
value 0.14523
scoring_system epss
scoring_elements 0.94447
published_at 2026-04-08T12:55:00Z
9
value 0.14523
scoring_system epss
scoring_elements 0.9445
published_at 2026-04-09T12:55:00Z
10
value 0.14523
scoring_system epss
scoring_elements 0.94453
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-27840
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10730
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27840
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20277
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1941400
reference_id 1941400
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1941400
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985936
reference_id 985936
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985936
8
reference_url https://security.archlinux.org/AVG-1732
reference_id AVG-1732
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1732
9
reference_url https://security.archlinux.org/AVG-1734
reference_id AVG-1734
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1734
10
reference_url https://security.gentoo.org/glsa/202105-22
reference_id GLSA-202105-22
reference_type
scores
url https://security.gentoo.org/glsa/202105-22
11
reference_url https://usn.ubuntu.com/4888-1/
reference_id USN-4888-1
reference_type
scores
url https://usn.ubuntu.com/4888-1/
12
reference_url https://usn.ubuntu.com/4888-2/
reference_id USN-4888-2
reference_type
scores
url https://usn.ubuntu.com/4888-2/
fixed_packages
0
url pkg:deb/debian/ldb@2:2.2.3-2~deb11u2
purl pkg:deb/debian/ldb@2:2.2.3-2~deb11u2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ldb@2:2.2.3-2~deb11u2
aliases CVE-2020-27840
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-28rq-1d68-4bfz
1
url VCID-2w26-yjmn-k7an
vulnerability_id VCID-2w26-yjmn-k7an
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20277.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20277.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-20277
reference_id
reference_type
scores
0
value 0.08492
scoring_system epss
scoring_elements 0.92332
published_at 2026-04-01T12:55:00Z
1
value 0.08492
scoring_system epss
scoring_elements 0.92382
published_at 2026-04-21T12:55:00Z
2
value 0.08492
scoring_system epss
scoring_elements 0.92371
published_at 2026-04-12T12:55:00Z
3
value 0.08492
scoring_system epss
scoring_elements 0.92381
published_at 2026-04-16T12:55:00Z
4
value 0.08492
scoring_system epss
scoring_elements 0.9238
published_at 2026-04-18T12:55:00Z
5
value 0.08492
scoring_system epss
scoring_elements 0.92339
published_at 2026-04-02T12:55:00Z
6
value 0.08492
scoring_system epss
scoring_elements 0.92344
published_at 2026-04-04T12:55:00Z
7
value 0.08492
scoring_system epss
scoring_elements 0.92348
published_at 2026-04-07T12:55:00Z
8
value 0.08492
scoring_system epss
scoring_elements 0.92359
published_at 2026-04-08T12:55:00Z
9
value 0.08492
scoring_system epss
scoring_elements 0.92364
published_at 2026-04-09T12:55:00Z
10
value 0.08492
scoring_system epss
scoring_elements 0.92369
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-20277
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10730
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27840
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20277
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1941402
reference_id 1941402
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1941402
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985935
reference_id 985935
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985935
8
reference_url https://security.archlinux.org/AVG-1732
reference_id AVG-1732
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1732
9
reference_url https://security.archlinux.org/AVG-1734
reference_id AVG-1734
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1734
10
reference_url https://security.gentoo.org/glsa/202105-22
reference_id GLSA-202105-22
reference_type
scores
url https://security.gentoo.org/glsa/202105-22
11
reference_url https://access.redhat.com/errata/RHSA-2021:1072
reference_id RHSA-2021:1072
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1072
12
reference_url https://access.redhat.com/errata/RHSA-2021:1197
reference_id RHSA-2021:1197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1197
13
reference_url https://access.redhat.com/errata/RHSA-2021:1213
reference_id RHSA-2021:1213
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1213
14
reference_url https://access.redhat.com/errata/RHSA-2021:1214
reference_id RHSA-2021:1214
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1214
15
reference_url https://access.redhat.com/errata/RHSA-2021:2331
reference_id RHSA-2021:2331
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2331
16
reference_url https://access.redhat.com/errata/RHSA-2021:2786
reference_id RHSA-2021:2786
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2786
17
reference_url https://usn.ubuntu.com/4888-1/
reference_id USN-4888-1
reference_type
scores
url https://usn.ubuntu.com/4888-1/
18
reference_url https://usn.ubuntu.com/4888-2/
reference_id USN-4888-2
reference_type
scores
url https://usn.ubuntu.com/4888-2/
fixed_packages
0
url pkg:deb/debian/ldb@2:2.2.3-2~deb11u2
purl pkg:deb/debian/ldb@2:2.2.3-2~deb11u2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ldb@2:2.2.3-2~deb11u2
aliases CVE-2021-20277
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2w26-yjmn-k7an
2
url VCID-vu43-fq85-a7eq
vulnerability_id VCID-vu43-fq85-a7eq
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10730.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10730.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-10730
reference_id
reference_type
scores
0
value 0.0314
scoring_system epss
scoring_elements 0.86825
published_at 2026-04-01T12:55:00Z
1
value 0.0314
scoring_system epss
scoring_elements 0.86903
published_at 2026-04-21T12:55:00Z
2
value 0.0314
scoring_system epss
scoring_elements 0.8688
published_at 2026-04-13T12:55:00Z
3
value 0.0314
scoring_system epss
scoring_elements 0.86898
published_at 2026-04-16T12:55:00Z
4
value 0.0314
scoring_system epss
scoring_elements 0.86836
published_at 2026-04-02T12:55:00Z
5
value 0.0314
scoring_system epss
scoring_elements 0.86855
published_at 2026-04-04T12:55:00Z
6
value 0.0314
scoring_system epss
scoring_elements 0.86849
published_at 2026-04-07T12:55:00Z
7
value 0.0314
scoring_system epss
scoring_elements 0.86868
published_at 2026-04-08T12:55:00Z
8
value 0.0314
scoring_system epss
scoring_elements 0.86877
published_at 2026-04-09T12:55:00Z
9
value 0.0314
scoring_system epss
scoring_elements 0.8689
published_at 2026-04-11T12:55:00Z
10
value 0.0314
scoring_system epss
scoring_elements 0.86885
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-10730
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10730
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27840
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20277
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1849489
reference_id 1849489
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1849489
7
reference_url https://security.archlinux.org/AVG-1202
reference_id AVG-1202
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1202
8
reference_url https://security.gentoo.org/glsa/202007-15
reference_id GLSA-202007-15
reference_type
scores
url https://security.gentoo.org/glsa/202007-15
9
reference_url https://access.redhat.com/errata/RHSA-2020:3118
reference_id RHSA-2020:3118
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3118
10
reference_url https://access.redhat.com/errata/RHSA-2020:3119
reference_id RHSA-2020:3119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3119
11
reference_url https://access.redhat.com/errata/RHSA-2020:4568
reference_id RHSA-2020:4568
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4568
12
reference_url https://usn.ubuntu.com/4409-1/
reference_id USN-4409-1
reference_type
scores
url https://usn.ubuntu.com/4409-1/
fixed_packages
0
url pkg:deb/debian/ldb@2:2.2.3-2~deb11u2
purl pkg:deb/debian/ldb@2:2.2.3-2~deb11u2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ldb@2:2.2.3-2~deb11u2
aliases CVE-2020-10730
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vu43-fq85-a7eq
3
url VCID-w4c6-p858-rkaw
vulnerability_id VCID-w4c6-p858-rkaw
summary Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3670.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3670.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3670
reference_id
reference_type
scores
0
value 0.03165
scoring_system epss
scoring_elements 0.86903
published_at 2026-04-04T12:55:00Z
1
value 0.03165
scoring_system epss
scoring_elements 0.86874
published_at 2026-04-01T12:55:00Z
2
value 0.03165
scoring_system epss
scoring_elements 0.86885
published_at 2026-04-02T12:55:00Z
3
value 0.03426
scoring_system epss
scoring_elements 0.87472
published_at 2026-04-11T12:55:00Z
4
value 0.03426
scoring_system epss
scoring_elements 0.87467
published_at 2026-04-12T12:55:00Z
5
value 0.03426
scoring_system epss
scoring_elements 0.87464
published_at 2026-04-13T12:55:00Z
6
value 0.03426
scoring_system epss
scoring_elements 0.87478
published_at 2026-04-21T12:55:00Z
7
value 0.03426
scoring_system epss
scoring_elements 0.8748
published_at 2026-04-18T12:55:00Z
8
value 0.03426
scoring_system epss
scoring_elements 0.87435
published_at 2026-04-07T12:55:00Z
9
value 0.03426
scoring_system epss
scoring_elements 0.87453
published_at 2026-04-08T12:55:00Z
10
value 0.03426
scoring_system epss
scoring_elements 0.8746
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3670
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3670
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2077533
reference_id 2077533
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2077533
5
reference_url https://security.gentoo.org/glsa/202309-06
reference_id GLSA-202309-06
reference_type
scores
url https://security.gentoo.org/glsa/202309-06
6
reference_url https://usn.ubuntu.com/5542-1/
reference_id USN-5542-1
reference_type
scores
url https://usn.ubuntu.com/5542-1/
fixed_packages
0
url pkg:deb/debian/ldb@2:2.2.3-2~deb11u2
purl pkg:deb/debian/ldb@2:2.2.3-2~deb11u2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ldb@2:2.2.3-2~deb11u2
aliases CVE-2021-3670
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w4c6-p858-rkaw
Fixing_vulnerabilities
0
url VCID-28rq-1d68-4bfz
vulnerability_id VCID-28rq-1d68-4bfz
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27840.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27840.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-27840
reference_id
reference_type
scores
0
value 0.14523
scoring_system epss
scoring_elements 0.94417
published_at 2026-04-01T12:55:00Z
1
value 0.14523
scoring_system epss
scoring_elements 0.94477
published_at 2026-04-21T12:55:00Z
2
value 0.14523
scoring_system epss
scoring_elements 0.94455
published_at 2026-04-13T12:55:00Z
3
value 0.14523
scoring_system epss
scoring_elements 0.94469
published_at 2026-04-16T12:55:00Z
4
value 0.14523
scoring_system epss
scoring_elements 0.94474
published_at 2026-04-18T12:55:00Z
5
value 0.14523
scoring_system epss
scoring_elements 0.94424
published_at 2026-04-02T12:55:00Z
6
value 0.14523
scoring_system epss
scoring_elements 0.94435
published_at 2026-04-04T12:55:00Z
7
value 0.14523
scoring_system epss
scoring_elements 0.94437
published_at 2026-04-07T12:55:00Z
8
value 0.14523
scoring_system epss
scoring_elements 0.94447
published_at 2026-04-08T12:55:00Z
9
value 0.14523
scoring_system epss
scoring_elements 0.9445
published_at 2026-04-09T12:55:00Z
10
value 0.14523
scoring_system epss
scoring_elements 0.94453
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-27840
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10730
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27840
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20277
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1941400
reference_id 1941400
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1941400
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985936
reference_id 985936
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985936
8
reference_url https://security.archlinux.org/AVG-1732
reference_id AVG-1732
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1732
9
reference_url https://security.archlinux.org/AVG-1734
reference_id AVG-1734
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1734
10
reference_url https://security.gentoo.org/glsa/202105-22
reference_id GLSA-202105-22
reference_type
scores
url https://security.gentoo.org/glsa/202105-22
11
reference_url https://usn.ubuntu.com/4888-1/
reference_id USN-4888-1
reference_type
scores
url https://usn.ubuntu.com/4888-1/
12
reference_url https://usn.ubuntu.com/4888-2/
reference_id USN-4888-2
reference_type
scores
url https://usn.ubuntu.com/4888-2/
fixed_packages
0
url pkg:deb/debian/ldb@2:1.5.1%2Breally1.4.6-3%2Bdeb10u1
purl pkg:deb/debian/ldb@2:1.5.1%2Breally1.4.6-3%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-28rq-1d68-4bfz
1
vulnerability VCID-2w26-yjmn-k7an
2
vulnerability VCID-vu43-fq85-a7eq
3
vulnerability VCID-w4c6-p858-rkaw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ldb@2:1.5.1%252Breally1.4.6-3%252Bdeb10u1
1
url pkg:deb/debian/ldb@2:2.2.3-2~deb11u2
purl pkg:deb/debian/ldb@2:2.2.3-2~deb11u2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ldb@2:2.2.3-2~deb11u2
aliases CVE-2020-27840
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-28rq-1d68-4bfz
1
url VCID-2w26-yjmn-k7an
vulnerability_id VCID-2w26-yjmn-k7an
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20277.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20277.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-20277
reference_id
reference_type
scores
0
value 0.08492
scoring_system epss
scoring_elements 0.92332
published_at 2026-04-01T12:55:00Z
1
value 0.08492
scoring_system epss
scoring_elements 0.92382
published_at 2026-04-21T12:55:00Z
2
value 0.08492
scoring_system epss
scoring_elements 0.92371
published_at 2026-04-12T12:55:00Z
3
value 0.08492
scoring_system epss
scoring_elements 0.92381
published_at 2026-04-16T12:55:00Z
4
value 0.08492
scoring_system epss
scoring_elements 0.9238
published_at 2026-04-18T12:55:00Z
5
value 0.08492
scoring_system epss
scoring_elements 0.92339
published_at 2026-04-02T12:55:00Z
6
value 0.08492
scoring_system epss
scoring_elements 0.92344
published_at 2026-04-04T12:55:00Z
7
value 0.08492
scoring_system epss
scoring_elements 0.92348
published_at 2026-04-07T12:55:00Z
8
value 0.08492
scoring_system epss
scoring_elements 0.92359
published_at 2026-04-08T12:55:00Z
9
value 0.08492
scoring_system epss
scoring_elements 0.92364
published_at 2026-04-09T12:55:00Z
10
value 0.08492
scoring_system epss
scoring_elements 0.92369
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-20277
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10730
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27840
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20277
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1941402
reference_id 1941402
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1941402
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985935
reference_id 985935
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985935
8
reference_url https://security.archlinux.org/AVG-1732
reference_id AVG-1732
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1732
9
reference_url https://security.archlinux.org/AVG-1734
reference_id AVG-1734
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1734
10
reference_url https://security.gentoo.org/glsa/202105-22
reference_id GLSA-202105-22
reference_type
scores
url https://security.gentoo.org/glsa/202105-22
11
reference_url https://access.redhat.com/errata/RHSA-2021:1072
reference_id RHSA-2021:1072
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1072
12
reference_url https://access.redhat.com/errata/RHSA-2021:1197
reference_id RHSA-2021:1197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1197
13
reference_url https://access.redhat.com/errata/RHSA-2021:1213
reference_id RHSA-2021:1213
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1213
14
reference_url https://access.redhat.com/errata/RHSA-2021:1214
reference_id RHSA-2021:1214
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1214
15
reference_url https://access.redhat.com/errata/RHSA-2021:2331
reference_id RHSA-2021:2331
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2331
16
reference_url https://access.redhat.com/errata/RHSA-2021:2786
reference_id RHSA-2021:2786
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2786
17
reference_url https://usn.ubuntu.com/4888-1/
reference_id USN-4888-1
reference_type
scores
url https://usn.ubuntu.com/4888-1/
18
reference_url https://usn.ubuntu.com/4888-2/
reference_id USN-4888-2
reference_type
scores
url https://usn.ubuntu.com/4888-2/
fixed_packages
0
url pkg:deb/debian/ldb@2:1.5.1%2Breally1.4.6-3%2Bdeb10u1
purl pkg:deb/debian/ldb@2:1.5.1%2Breally1.4.6-3%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-28rq-1d68-4bfz
1
vulnerability VCID-2w26-yjmn-k7an
2
vulnerability VCID-vu43-fq85-a7eq
3
vulnerability VCID-w4c6-p858-rkaw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ldb@2:1.5.1%252Breally1.4.6-3%252Bdeb10u1
1
url pkg:deb/debian/ldb@2:2.2.3-2~deb11u2
purl pkg:deb/debian/ldb@2:2.2.3-2~deb11u2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ldb@2:2.2.3-2~deb11u2
aliases CVE-2021-20277
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2w26-yjmn-k7an
2
url VCID-ce1t-wb2k-2uct
vulnerability_id VCID-ce1t-wb2k-2uct
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00035.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00035.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3824.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3824.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-3824
reference_id
reference_type
scores
0
value 0.11794
scoring_system epss
scoring_elements 0.93671
published_at 2026-04-01T12:55:00Z
1
value 0.11794
scoring_system epss
scoring_elements 0.93737
published_at 2026-04-21T12:55:00Z
2
value 0.11794
scoring_system epss
scoring_elements 0.93711
published_at 2026-04-13T12:55:00Z
3
value 0.11794
scoring_system epss
scoring_elements 0.93728
published_at 2026-04-16T12:55:00Z
4
value 0.11794
scoring_system epss
scoring_elements 0.93734
published_at 2026-04-18T12:55:00Z
5
value 0.11794
scoring_system epss
scoring_elements 0.93681
published_at 2026-04-02T12:55:00Z
6
value 0.11794
scoring_system epss
scoring_elements 0.93692
published_at 2026-04-04T12:55:00Z
7
value 0.11794
scoring_system epss
scoring_elements 0.93694
published_at 2026-04-07T12:55:00Z
8
value 0.11794
scoring_system epss
scoring_elements 0.93704
published_at 2026-04-08T12:55:00Z
9
value 0.11794
scoring_system epss
scoring_elements 0.93705
published_at 2026-04-09T12:55:00Z
10
value 0.11794
scoring_system epss
scoring_elements 0.9371
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-3824
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3824
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3824
4
reference_url https://bugzilla.samba.org/show_bug.cgi?id=13773
reference_id
reference_type
scores
url https://bugzilla.samba.org/show_bug.cgi?id=13773
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3824
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://lists.debian.org/debian-lts-announce/2019/03/msg00000.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/03/msg00000.html
8
reference_url https://security.netapp.com/advisory/ntap-20190226-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190226-0001/
9
reference_url https://www.debian.org/security/2019/dsa-4397
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4397
10
reference_url http://www.securityfocus.com/bid/107347
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/107347
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1671845
reference_id 1671845
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1671845
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-3824
reference_id CVE-2019-3824
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-3824
19
reference_url https://usn.ubuntu.com/3895-1/
reference_id USN-3895-1
reference_type
scores
url https://usn.ubuntu.com/3895-1/
fixed_packages
0
url pkg:deb/debian/ldb@2:1.1.27-1%2Bdeb9u1
purl pkg:deb/debian/ldb@2:1.1.27-1%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-28rq-1d68-4bfz
1
vulnerability VCID-2w26-yjmn-k7an
2
vulnerability VCID-ce1t-wb2k-2uct
3
vulnerability VCID-vu43-fq85-a7eq
4
vulnerability VCID-w4c6-p858-rkaw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ldb@2:1.1.27-1%252Bdeb9u1
1
url pkg:deb/debian/ldb@2:1.5.1%2Breally1.4.6-3%2Bdeb10u1
purl pkg:deb/debian/ldb@2:1.5.1%2Breally1.4.6-3%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-28rq-1d68-4bfz
1
vulnerability VCID-2w26-yjmn-k7an
2
vulnerability VCID-vu43-fq85-a7eq
3
vulnerability VCID-w4c6-p858-rkaw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ldb@2:1.5.1%252Breally1.4.6-3%252Bdeb10u1
aliases CVE-2019-3824
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ce1t-wb2k-2uct
3
url VCID-vu43-fq85-a7eq
vulnerability_id VCID-vu43-fq85-a7eq
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10730.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10730.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-10730
reference_id
reference_type
scores
0
value 0.0314
scoring_system epss
scoring_elements 0.86825
published_at 2026-04-01T12:55:00Z
1
value 0.0314
scoring_system epss
scoring_elements 0.86903
published_at 2026-04-21T12:55:00Z
2
value 0.0314
scoring_system epss
scoring_elements 0.8688
published_at 2026-04-13T12:55:00Z
3
value 0.0314
scoring_system epss
scoring_elements 0.86898
published_at 2026-04-16T12:55:00Z
4
value 0.0314
scoring_system epss
scoring_elements 0.86836
published_at 2026-04-02T12:55:00Z
5
value 0.0314
scoring_system epss
scoring_elements 0.86855
published_at 2026-04-04T12:55:00Z
6
value 0.0314
scoring_system epss
scoring_elements 0.86849
published_at 2026-04-07T12:55:00Z
7
value 0.0314
scoring_system epss
scoring_elements 0.86868
published_at 2026-04-08T12:55:00Z
8
value 0.0314
scoring_system epss
scoring_elements 0.86877
published_at 2026-04-09T12:55:00Z
9
value 0.0314
scoring_system epss
scoring_elements 0.8689
published_at 2026-04-11T12:55:00Z
10
value 0.0314
scoring_system epss
scoring_elements 0.86885
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-10730
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10730
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27840
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20277
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1849489
reference_id 1849489
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1849489
7
reference_url https://security.archlinux.org/AVG-1202
reference_id AVG-1202
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1202
8
reference_url https://security.gentoo.org/glsa/202007-15
reference_id GLSA-202007-15
reference_type
scores
url https://security.gentoo.org/glsa/202007-15
9
reference_url https://access.redhat.com/errata/RHSA-2020:3118
reference_id RHSA-2020:3118
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3118
10
reference_url https://access.redhat.com/errata/RHSA-2020:3119
reference_id RHSA-2020:3119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3119
11
reference_url https://access.redhat.com/errata/RHSA-2020:4568
reference_id RHSA-2020:4568
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4568
12
reference_url https://usn.ubuntu.com/4409-1/
reference_id USN-4409-1
reference_type
scores
url https://usn.ubuntu.com/4409-1/
fixed_packages
0
url pkg:deb/debian/ldb@2:1.5.1%2Breally1.4.6-3%2Bdeb10u1
purl pkg:deb/debian/ldb@2:1.5.1%2Breally1.4.6-3%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-28rq-1d68-4bfz
1
vulnerability VCID-2w26-yjmn-k7an
2
vulnerability VCID-vu43-fq85-a7eq
3
vulnerability VCID-w4c6-p858-rkaw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ldb@2:1.5.1%252Breally1.4.6-3%252Bdeb10u1
1
url pkg:deb/debian/ldb@2:2.2.3-2~deb11u2
purl pkg:deb/debian/ldb@2:2.2.3-2~deb11u2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ldb@2:2.2.3-2~deb11u2
aliases CVE-2020-10730
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vu43-fq85-a7eq
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/ldb@2:1.5.1%252Breally1.4.6-3%252Bdeb10u1