Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
Typedeb
Namespacedebian
Namesamba
Version2:4.17.12+dfsg-0+deb12u3
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2:4.18.5+dfsg-1
Latest_non_vulnerable_version2:4.24.1+dfsg-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-18xs-py1v-xfey
vulnerability_id VCID-18xs-py1v-xfey
summary Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0225.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0225.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0225
reference_id
reference_type
scores
0
value 0.00355
scoring_system epss
scoring_elements 0.57823
published_at 2026-04-04T12:55:00Z
1
value 0.00355
scoring_system epss
scoring_elements 0.57798
published_at 2026-04-07T12:55:00Z
2
value 0.00355
scoring_system epss
scoring_elements 0.57853
published_at 2026-04-08T12:55:00Z
3
value 0.00355
scoring_system epss
scoring_elements 0.57854
published_at 2026-04-09T12:55:00Z
4
value 0.00355
scoring_system epss
scoring_elements 0.5787
published_at 2026-04-11T12:55:00Z
5
value 0.00355
scoring_system epss
scoring_elements 0.57849
published_at 2026-04-12T12:55:00Z
6
value 0.00355
scoring_system epss
scoring_elements 0.57828
published_at 2026-04-13T12:55:00Z
7
value 0.00355
scoring_system epss
scoring_elements 0.57857
published_at 2026-04-16T12:55:00Z
8
value 0.00355
scoring_system epss
scoring_elements 0.57856
published_at 2026-04-18T12:55:00Z
9
value 0.00413
scoring_system epss
scoring_elements 0.61505
published_at 2026-04-21T12:55:00Z
10
value 0.00464
scoring_system epss
scoring_elements 0.64299
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0225
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0225
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0225
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2182772
reference_id 2182772
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2182772
5
reference_url https://www.samba.org/samba/security/CVE-2023-0225.html
reference_id CVE-2023-0225.html
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-18T15:04:24Z/
url https://www.samba.org/samba/security/CVE-2023-0225.html
6
reference_url https://security.gentoo.org/glsa/202309-06
reference_id GLSA-202309-06
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-18T15:04:24Z/
url https://security.gentoo.org/glsa/202309-06
7
reference_url https://security.netapp.com/advisory/ntap-20230406-0007/
reference_id ntap-20230406-0007
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-18T15:04:24Z/
url https://security.netapp.com/advisory/ntap-20230406-0007/
fixed_packages
0
url pkg:deb/debian/samba@2:4.17.7%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.17.7%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.7%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2023-0225
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-18xs-py1v-xfey
1
url VCID-1937-3d92-mqft
vulnerability_id VCID-1937-3d92-mqft
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0815.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0815.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0815
reference_id
reference_type
scores
0
value 0.08221
scoring_system epss
scoring_elements 0.92179
published_at 2026-04-01T12:55:00Z
1
value 0.08221
scoring_system epss
scoring_elements 0.92186
published_at 2026-04-02T12:55:00Z
2
value 0.08221
scoring_system epss
scoring_elements 0.92192
published_at 2026-04-04T12:55:00Z
3
value 0.08221
scoring_system epss
scoring_elements 0.92195
published_at 2026-04-07T12:55:00Z
4
value 0.08221
scoring_system epss
scoring_elements 0.92207
published_at 2026-04-08T12:55:00Z
5
value 0.08221
scoring_system epss
scoring_elements 0.9221
published_at 2026-04-09T12:55:00Z
6
value 0.08221
scoring_system epss
scoring_elements 0.92216
published_at 2026-04-11T12:55:00Z
7
value 0.08221
scoring_system epss
scoring_elements 0.92217
published_at 2026-04-12T12:55:00Z
8
value 0.08221
scoring_system epss
scoring_elements 0.92213
published_at 2026-04-13T12:55:00Z
9
value 0.08221
scoring_system epss
scoring_elements 0.92225
published_at 2026-04-16T12:55:00Z
10
value 0.08221
scoring_system epss
scoring_elements 0.92224
published_at 2026-04-18T12:55:00Z
11
value 0.08221
scoring_system epss
scoring_elements 0.92226
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0815
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0815
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617303
reference_id 1617303
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617303
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=274342
reference_id 274342
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=274342
5
reference_url https://access.redhat.com/errata/RHSA-2004:498
reference_id RHSA-2004:498
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:498
fixed_packages
0
url pkg:deb/debian/samba@3.0.6-1?distro=trixie
purl pkg:deb/debian/samba@3.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@3.0.6-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2004-0815
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1937-3d92-mqft
2
url VCID-21hz-xvek-73cd
vulnerability_id VCID-21hz-xvek-73cd
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16860.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16860.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-16860
reference_id
reference_type
scores
0
value 0.02024
scoring_system epss
scoring_elements 0.83706
published_at 2026-04-01T12:55:00Z
1
value 0.02024
scoring_system epss
scoring_elements 0.83719
published_at 2026-04-02T12:55:00Z
2
value 0.02024
scoring_system epss
scoring_elements 0.83734
published_at 2026-04-04T12:55:00Z
3
value 0.02024
scoring_system epss
scoring_elements 0.83736
published_at 2026-04-07T12:55:00Z
4
value 0.02024
scoring_system epss
scoring_elements 0.8376
published_at 2026-04-08T12:55:00Z
5
value 0.02024
scoring_system epss
scoring_elements 0.83767
published_at 2026-04-09T12:55:00Z
6
value 0.02024
scoring_system epss
scoring_elements 0.83783
published_at 2026-04-11T12:55:00Z
7
value 0.02024
scoring_system epss
scoring_elements 0.83777
published_at 2026-04-12T12:55:00Z
8
value 0.02024
scoring_system epss
scoring_elements 0.83772
published_at 2026-04-13T12:55:00Z
9
value 0.02024
scoring_system epss
scoring_elements 0.83806
published_at 2026-04-16T12:55:00Z
10
value 0.02024
scoring_system epss
scoring_elements 0.83807
published_at 2026-04-18T12:55:00Z
11
value 0.02024
scoring_system epss
scoring_elements 0.83808
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-16860
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16860
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1705877
reference_id 1705877
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1705877
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928966
reference_id 928966
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928966
7
reference_url https://security.gentoo.org/glsa/202003-52
reference_id GLSA-202003-52
reference_type
scores
url https://security.gentoo.org/glsa/202003-52
8
reference_url https://usn.ubuntu.com/3976-1/
reference_id USN-3976-1
reference_type
scores
url https://usn.ubuntu.com/3976-1/
9
reference_url https://usn.ubuntu.com/3976-2/
reference_id USN-3976-2
reference_type
scores
url https://usn.ubuntu.com/3976-2/
10
reference_url https://usn.ubuntu.com/5675-1/
reference_id USN-5675-1
reference_type
scores
url https://usn.ubuntu.com/5675-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.9.5%2Bdfsg-4?distro=trixie
purl pkg:deb/debian/samba@2:4.9.5%2Bdfsg-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-4%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2018-16860
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-21hz-xvek-73cd
3
url VCID-26kr-61ku-ufe2
vulnerability_id VCID-26kr-61ku-ufe2
summary samba: remote code execution in nmbd
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136280.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136280.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2014-08/msg00027.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-08/msg00027.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3560.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3560.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3560
reference_id
reference_type
scores
0
value 0.71948
scoring_system epss
scoring_elements 0.98748
published_at 2026-04-21T12:55:00Z
1
value 0.71948
scoring_system epss
scoring_elements 0.98733
published_at 2026-04-02T12:55:00Z
2
value 0.71948
scoring_system epss
scoring_elements 0.98736
published_at 2026-04-04T12:55:00Z
3
value 0.71948
scoring_system epss
scoring_elements 0.9874
published_at 2026-04-09T12:55:00Z
4
value 0.71948
scoring_system epss
scoring_elements 0.98741
published_at 2026-04-08T12:55:00Z
5
value 0.71948
scoring_system epss
scoring_elements 0.98743
published_at 2026-04-11T12:55:00Z
6
value 0.71948
scoring_system epss
scoring_elements 0.98744
published_at 2026-04-12T12:55:00Z
7
value 0.71948
scoring_system epss
scoring_elements 0.98745
published_at 2026-04-13T12:55:00Z
8
value 0.71948
scoring_system epss
scoring_elements 0.98747
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3560
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3560
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3560
6
reference_url http://secunia.com/advisories/59583
reference_id
reference_type
scores
url http://secunia.com/advisories/59583
7
reference_url http://secunia.com/advisories/59610
reference_id
reference_type
scores
url http://secunia.com/advisories/59610
8
reference_url http://secunia.com/advisories/59976
reference_id
reference_type
scores
url http://secunia.com/advisories/59976
9
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/95081
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/95081
10
reference_url https://git.samba.org/?p=samba.git%3Ba=commitdiff%3Bh=e6a848630da3ba958c442438ea131c99fa088605
reference_id
reference_type
scores
url https://git.samba.org/?p=samba.git%3Ba=commitdiff%3Bh=e6a848630da3ba958c442438ea131c99fa088605
11
reference_url https://git.samba.org/?p=samba.git%3Ba=commitdiff%3Bh=fb1d325d96dfe9bc2e9c4ec46ad4c55e8f18f4a2
reference_id
reference_type
scores
url https://git.samba.org/?p=samba.git%3Ba=commitdiff%3Bh=fb1d325d96dfe9bc2e9c4ec46ad4c55e8f18f4a2
12
reference_url http://www.samba.org/samba/security/CVE-2014-3560
reference_id
reference_type
scores
url http://www.samba.org/samba/security/CVE-2014-3560
13
reference_url http://www.securityfocus.com/bid/69021
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/69021
14
reference_url http://www.securitytracker.com/id/1030663
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030663
15
reference_url http://www.ubuntu.com/usn/USN-2305-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2305-1
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1126010
reference_id 1126010
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1126010
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=756759
reference_id 756759
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=756759
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3560
reference_id CVE-2014-3560
reference_type
scores
0
value 7.9
scoring_system cvssv2
scoring_elements AV:A/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-3560
54
reference_url https://access.redhat.com/errata/RHSA-2014:1008
reference_id RHSA-2014:1008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1008
55
reference_url https://access.redhat.com/errata/RHSA-2014:1009
reference_id RHSA-2014:1009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1009
56
reference_url https://usn.ubuntu.com/2305-1/
reference_id USN-2305-1
reference_type
scores
url https://usn.ubuntu.com/2305-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.1.11%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.1.11%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.1.11%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2014-3560
risk_score 3.5
exploitability 0.5
weighted_severity 7.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-26kr-61ku-ufe2
4
url VCID-28rq-1d68-4bfz
vulnerability_id VCID-28rq-1d68-4bfz
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27840.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27840.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-27840
reference_id
reference_type
scores
0
value 0.14523
scoring_system epss
scoring_elements 0.94417
published_at 2026-04-01T12:55:00Z
1
value 0.14523
scoring_system epss
scoring_elements 0.94477
published_at 2026-04-21T12:55:00Z
2
value 0.14523
scoring_system epss
scoring_elements 0.94455
published_at 2026-04-13T12:55:00Z
3
value 0.14523
scoring_system epss
scoring_elements 0.94469
published_at 2026-04-16T12:55:00Z
4
value 0.14523
scoring_system epss
scoring_elements 0.94474
published_at 2026-04-18T12:55:00Z
5
value 0.14523
scoring_system epss
scoring_elements 0.94424
published_at 2026-04-02T12:55:00Z
6
value 0.14523
scoring_system epss
scoring_elements 0.94435
published_at 2026-04-04T12:55:00Z
7
value 0.14523
scoring_system epss
scoring_elements 0.94437
published_at 2026-04-07T12:55:00Z
8
value 0.14523
scoring_system epss
scoring_elements 0.94447
published_at 2026-04-08T12:55:00Z
9
value 0.14523
scoring_system epss
scoring_elements 0.9445
published_at 2026-04-09T12:55:00Z
10
value 0.14523
scoring_system epss
scoring_elements 0.94453
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-27840
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10730
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27840
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20277
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1941400
reference_id 1941400
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1941400
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985936
reference_id 985936
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985936
8
reference_url https://security.archlinux.org/AVG-1732
reference_id AVG-1732
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1732
9
reference_url https://security.archlinux.org/AVG-1734
reference_id AVG-1734
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1734
10
reference_url https://security.gentoo.org/glsa/202105-22
reference_id GLSA-202105-22
reference_type
scores
url https://security.gentoo.org/glsa/202105-22
11
reference_url https://usn.ubuntu.com/4888-1/
reference_id USN-4888-1
reference_type
scores
url https://usn.ubuntu.com/4888-1/
12
reference_url https://usn.ubuntu.com/4888-2/
reference_id USN-4888-2
reference_type
scores
url https://usn.ubuntu.com/4888-2/
fixed_packages
0
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2020-27840
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-28rq-1d68-4bfz
5
url VCID-29k5-64fs-ufcd
vulnerability_id VCID-29k5-64fs-ufcd
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12150.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12150.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12150
reference_id
reference_type
scores
0
value 0.19902
scoring_system epss
scoring_elements 0.95421
published_at 2026-04-01T12:55:00Z
1
value 0.19902
scoring_system epss
scoring_elements 0.95472
published_at 2026-04-21T12:55:00Z
2
value 0.19902
scoring_system epss
scoring_elements 0.95463
published_at 2026-04-16T12:55:00Z
3
value 0.19902
scoring_system epss
scoring_elements 0.95468
published_at 2026-04-18T12:55:00Z
4
value 0.19902
scoring_system epss
scoring_elements 0.95429
published_at 2026-04-02T12:55:00Z
5
value 0.19902
scoring_system epss
scoring_elements 0.95436
published_at 2026-04-04T12:55:00Z
6
value 0.19902
scoring_system epss
scoring_elements 0.95439
published_at 2026-04-07T12:55:00Z
7
value 0.19902
scoring_system epss
scoring_elements 0.95446
published_at 2026-04-08T12:55:00Z
8
value 0.19902
scoring_system epss
scoring_elements 0.95448
published_at 2026-04-09T12:55:00Z
9
value 0.19902
scoring_system epss
scoring_elements 0.95453
published_at 2026-04-12T12:55:00Z
10
value 0.19902
scoring_system epss
scoring_elements 0.95454
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12150
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12150
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12150
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12151
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12163
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12163
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv2
scoring_elements AV:A/AC:H/Au:N/C:C/I:C/A:N
1
value 8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1488400
reference_id 1488400
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1488400
7
reference_url https://access.redhat.com/errata/RHSA-2017:2789
reference_id RHSA-2017:2789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2789
8
reference_url https://access.redhat.com/errata/RHSA-2017:2790
reference_id RHSA-2017:2790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2790
9
reference_url https://access.redhat.com/errata/RHSA-2017:2791
reference_id RHSA-2017:2791
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2791
10
reference_url https://access.redhat.com/errata/RHSA-2017:2858
reference_id RHSA-2017:2858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2858
11
reference_url https://usn.ubuntu.com/3426-1/
reference_id USN-3426-1
reference_type
scores
url https://usn.ubuntu.com/3426-1/
12
reference_url https://usn.ubuntu.com/3426-2/
reference_id USN-3426-2
reference_type
scores
url https://usn.ubuntu.com/3426-2/
fixed_packages
0
url pkg:deb/debian/samba@2:4.6.7%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.6.7%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.6.7%252Bdfsg-2%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2017-12150
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-29k5-64fs-ufcd
6
url VCID-2dm7-xt4e-wkex
vulnerability_id VCID-2dm7-xt4e-wkex
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14303.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14303.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14303
reference_id
reference_type
scores
0
value 0.26364
scoring_system epss
scoring_elements 0.96273
published_at 2026-04-01T12:55:00Z
1
value 0.26364
scoring_system epss
scoring_elements 0.96327
published_at 2026-04-21T12:55:00Z
2
value 0.26364
scoring_system epss
scoring_elements 0.96321
published_at 2026-04-16T12:55:00Z
3
value 0.26364
scoring_system epss
scoring_elements 0.96325
published_at 2026-04-18T12:55:00Z
4
value 0.26364
scoring_system epss
scoring_elements 0.96281
published_at 2026-04-02T12:55:00Z
5
value 0.26364
scoring_system epss
scoring_elements 0.96289
published_at 2026-04-04T12:55:00Z
6
value 0.26364
scoring_system epss
scoring_elements 0.96293
published_at 2026-04-07T12:55:00Z
7
value 0.26364
scoring_system epss
scoring_elements 0.96302
published_at 2026-04-08T12:55:00Z
8
value 0.26364
scoring_system epss
scoring_elements 0.96305
published_at 2026-04-09T12:55:00Z
9
value 0.26364
scoring_system epss
scoring_elements 0.96309
published_at 2026-04-12T12:55:00Z
10
value 0.26364
scoring_system epss
scoring_elements 0.96312
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14303
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14303
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1851298
reference_id 1851298
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1851298
5
reference_url https://security.archlinux.org/AVG-1202
reference_id AVG-1202
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1202
6
reference_url https://security.gentoo.org/glsa/202007-15
reference_id GLSA-202007-15
reference_type
scores
url https://security.gentoo.org/glsa/202007-15
7
reference_url https://usn.ubuntu.com/4454-1/
reference_id USN-4454-1
reference_type
scores
url https://usn.ubuntu.com/4454-1/
8
reference_url https://usn.ubuntu.com/4454-2/
reference_id USN-4454-2
reference_type
scores
url https://usn.ubuntu.com/4454-2/
fixed_packages
0
url pkg:deb/debian/samba@2:4.12.5%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.12.5%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.12.5%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2020-14303
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2dm7-xt4e-wkex
7
url VCID-2ge2-952m-qbg9
vulnerability_id VCID-2ge2-952m-qbg9
summary samba incorrect primary group assignment for domain users using the rfc2307 or sfu winbind nss info plugin
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4138.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4138.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4138
reference_id
reference_type
scores
0
value 0.00123
scoring_system epss
scoring_elements 0.31422
published_at 2026-04-01T12:55:00Z
1
value 0.00123
scoring_system epss
scoring_elements 0.31557
published_at 2026-04-02T12:55:00Z
2
value 0.00123
scoring_system epss
scoring_elements 0.316
published_at 2026-04-04T12:55:00Z
3
value 0.00123
scoring_system epss
scoring_elements 0.31415
published_at 2026-04-07T12:55:00Z
4
value 0.00123
scoring_system epss
scoring_elements 0.31468
published_at 2026-04-08T12:55:00Z
5
value 0.00123
scoring_system epss
scoring_elements 0.31499
published_at 2026-04-09T12:55:00Z
6
value 0.00123
scoring_system epss
scoring_elements 0.31504
published_at 2026-04-11T12:55:00Z
7
value 0.00123
scoring_system epss
scoring_elements 0.31461
published_at 2026-04-12T12:55:00Z
8
value 0.00123
scoring_system epss
scoring_elements 0.31424
published_at 2026-04-13T12:55:00Z
9
value 0.00123
scoring_system epss
scoring_elements 0.31458
published_at 2026-04-16T12:55:00Z
10
value 0.00123
scoring_system epss
scoring_elements 0.31437
published_at 2026-04-18T12:55:00Z
11
value 0.00123
scoring_system epss
scoring_elements 0.31405
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4138
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4138
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4138
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=286271
reference_id 286271
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=286271
4
reference_url https://access.redhat.com/errata/RHSA-2007:1016
reference_id RHSA-2007:1016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1016
5
reference_url https://access.redhat.com/errata/RHSA-2007:1017
reference_id RHSA-2007:1017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1017
fixed_packages
0
url pkg:deb/debian/samba@3.0.26-1?distro=trixie
purl pkg:deb/debian/samba@3.0.26-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@3.0.26-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2007-4138
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2ge2-952m-qbg9
8
url VCID-2gkd-vubu-j7fd
vulnerability_id VCID-2gkd-vubu-j7fd
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14861.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14861.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-14861
reference_id
reference_type
scores
0
value 0.04997
scoring_system epss
scoring_elements 0.89717
published_at 2026-04-21T12:55:00Z
1
value 0.04997
scoring_system epss
scoring_elements 0.89663
published_at 2026-04-01T12:55:00Z
2
value 0.04997
scoring_system epss
scoring_elements 0.89666
published_at 2026-04-02T12:55:00Z
3
value 0.04997
scoring_system epss
scoring_elements 0.8968
published_at 2026-04-04T12:55:00Z
4
value 0.04997
scoring_system epss
scoring_elements 0.89683
published_at 2026-04-07T12:55:00Z
5
value 0.04997
scoring_system epss
scoring_elements 0.897
published_at 2026-04-08T12:55:00Z
6
value 0.04997
scoring_system epss
scoring_elements 0.89706
published_at 2026-04-09T12:55:00Z
7
value 0.04997
scoring_system epss
scoring_elements 0.89713
published_at 2026-04-11T12:55:00Z
8
value 0.04997
scoring_system epss
scoring_elements 0.89712
published_at 2026-04-12T12:55:00Z
9
value 0.04997
scoring_system epss
scoring_elements 0.89705
published_at 2026-04-13T12:55:00Z
10
value 0.04997
scoring_system epss
scoring_elements 0.89721
published_at 2026-04-16T12:55:00Z
11
value 0.04997
scoring_system epss
scoring_elements 0.89722
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-14861
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14861
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1778586
reference_id 1778586
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1778586
4
reference_url http://www.openwall.com/lists/oss-security/2024/06/24/3
reference_id 3
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/
url http://www.openwall.com/lists/oss-security/2024/06/24/3
5
reference_url https://www.samba.org/samba/security/CVE-2019-14861.html
reference_id CVE-2019-14861.html
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/
url https://www.samba.org/samba/security/CVE-2019-14861.html
6
reference_url https://security.gentoo.org/glsa/202003-52
reference_id GLSA-202003-52
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/
url https://security.gentoo.org/glsa/202003-52
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00038.html
reference_id msg00038.html
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00038.html
8
reference_url https://security.netapp.com/advisory/ntap-20191210-0002/
reference_id ntap-20191210-0002
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/
url https://security.netapp.com/advisory/ntap-20191210-0002/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PJH3ROOFYMOATD2UEPC47P5RPBDTY77E/
reference_id PJH3ROOFYMOATD2UEPC47P5RPBDTY77E
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PJH3ROOFYMOATD2UEPC47P5RPBDTY77E/
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14861
reference_id show_bug.cgi?id=CVE-2019-14861
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14861
11
reference_url https://www.synology.com/security/advisory/Synology_SA_19_40
reference_id Synology_SA_19_40
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/
url https://www.synology.com/security/advisory/Synology_SA_19_40
12
reference_url https://usn.ubuntu.com/4217-1/
reference_id USN-4217-1
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/
url https://usn.ubuntu.com/4217-1/
13
reference_url https://usn.ubuntu.com/4217-2/
reference_id USN-4217-2
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/
url https://usn.ubuntu.com/4217-2/
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNKA4YIPV7AZR7KK3GW6L3HKGHSGJZFE/
reference_id WNKA4YIPV7AZR7KK3GW6L3HKGHSGJZFE
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNKA4YIPV7AZR7KK3GW6L3HKGHSGJZFE/
fixed_packages
0
url pkg:deb/debian/samba@2:4.11.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.11.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.11.3%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2019-14861
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2gkd-vubu-j7fd
9
url VCID-2ks6-vhre-6ke2
vulnerability_id VCID-2ks6-vhre-6ke2
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1140.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1140.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1140
reference_id
reference_type
scores
0
value 0.14503
scoring_system epss
scoring_elements 0.94413
published_at 2026-04-01T12:55:00Z
1
value 0.14503
scoring_system epss
scoring_elements 0.9442
published_at 2026-04-02T12:55:00Z
2
value 0.14503
scoring_system epss
scoring_elements 0.94431
published_at 2026-04-04T12:55:00Z
3
value 0.14503
scoring_system epss
scoring_elements 0.94433
published_at 2026-04-07T12:55:00Z
4
value 0.14503
scoring_system epss
scoring_elements 0.94443
published_at 2026-04-08T12:55:00Z
5
value 0.14503
scoring_system epss
scoring_elements 0.94446
published_at 2026-04-09T12:55:00Z
6
value 0.14503
scoring_system epss
scoring_elements 0.94449
published_at 2026-04-11T12:55:00Z
7
value 0.14503
scoring_system epss
scoring_elements 0.94451
published_at 2026-04-13T12:55:00Z
8
value 0.14503
scoring_system epss
scoring_elements 0.94465
published_at 2026-04-16T12:55:00Z
9
value 0.14503
scoring_system epss
scoring_elements 0.9447
published_at 2026-04-18T12:55:00Z
10
value 0.14503
scoring_system epss
scoring_elements 0.94473
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1140
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1140
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1580230
reference_id 1580230
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1580230
5
reference_url https://security.gentoo.org/glsa/202003-52
reference_id GLSA-202003-52
reference_type
scores
url https://security.gentoo.org/glsa/202003-52
fixed_packages
0
url pkg:deb/debian/samba@2:4.8.4%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.8.4%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.8.4%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2018-1140
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2ks6-vhre-6ke2
10
url VCID-2q9w-nvzs-g7cp
vulnerability_id VCID-2q9w-nvzs-g7cp
summary samba: symlink race permits opening files outside share directory
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2619.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2619.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-2619
reference_id
reference_type
scores
0
value 0.40665
scoring_system epss
scoring_elements 0.97341
published_at 2026-04-01T12:55:00Z
1
value 0.40665
scoring_system epss
scoring_elements 0.97347
published_at 2026-04-02T12:55:00Z
2
value 0.40665
scoring_system epss
scoring_elements 0.97351
published_at 2026-04-04T12:55:00Z
3
value 0.40665
scoring_system epss
scoring_elements 0.97352
published_at 2026-04-07T12:55:00Z
4
value 0.40665
scoring_system epss
scoring_elements 0.97359
published_at 2026-04-08T12:55:00Z
5
value 0.40665
scoring_system epss
scoring_elements 0.9736
published_at 2026-04-09T12:55:00Z
6
value 0.40665
scoring_system epss
scoring_elements 0.97362
published_at 2026-04-12T12:55:00Z
7
value 0.40665
scoring_system epss
scoring_elements 0.97363
published_at 2026-04-13T12:55:00Z
8
value 0.40665
scoring_system epss
scoring_elements 0.97371
published_at 2026-04-16T12:55:00Z
9
value 0.40665
scoring_system epss
scoring_elements 0.97374
published_at 2026-04-18T12:55:00Z
10
value 0.40665
scoring_system epss
scoring_elements 0.97375
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-2619
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2619
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:C/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1429472
reference_id 1429472
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1429472
5
reference_url https://bugs.chromium.org/p/project-zero/issues/detail?id=1039
reference_id CVE-2017-2619
reference_type exploit
scores
url https://bugs.chromium.org/p/project-zero/issues/detail?id=1039
6
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/41740.txt
reference_id CVE-2017-2619
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/41740.txt
7
reference_url https://access.redhat.com/errata/RHSA-2017:1265
reference_id RHSA-2017:1265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1265
8
reference_url https://access.redhat.com/errata/RHSA-2017:2338
reference_id RHSA-2017:2338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2338
9
reference_url https://access.redhat.com/errata/RHSA-2017:2778
reference_id RHSA-2017:2778
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2778
10
reference_url https://access.redhat.com/errata/RHSA-2017:2789
reference_id RHSA-2017:2789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2789
11
reference_url https://usn.ubuntu.com/3242-1/
reference_id USN-3242-1
reference_type
scores
url https://usn.ubuntu.com/3242-1/
12
reference_url https://usn.ubuntu.com/3267-1/
reference_id USN-3267-1
reference_type
scores
url https://usn.ubuntu.com/3267-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.5.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.5.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.5.6%252Bdfsg-2%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2017-2619
risk_score 10.0
exploitability 2.0
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2q9w-nvzs-g7cp
11
url VCID-2uuu-wpye-wufq
vulnerability_id VCID-2uuu-wpye-wufq
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which may allow execution of arbitrary code with root privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1182.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1182.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1182
reference_id
reference_type
scores
0
value 0.7681
scoring_system epss
scoring_elements 0.98942
published_at 2026-04-01T12:55:00Z
1
value 0.7681
scoring_system epss
scoring_elements 0.98944
published_at 2026-04-02T12:55:00Z
2
value 0.7681
scoring_system epss
scoring_elements 0.98945
published_at 2026-04-04T12:55:00Z
3
value 0.7681
scoring_system epss
scoring_elements 0.98948
published_at 2026-04-07T12:55:00Z
4
value 0.7681
scoring_system epss
scoring_elements 0.9895
published_at 2026-04-09T12:55:00Z
5
value 0.7681
scoring_system epss
scoring_elements 0.98952
published_at 2026-04-11T12:55:00Z
6
value 0.7681
scoring_system epss
scoring_elements 0.98953
published_at 2026-04-13T12:55:00Z
7
value 0.7681
scoring_system epss
scoring_elements 0.98955
published_at 2026-04-16T12:55:00Z
8
value 0.7681
scoring_system epss
scoring_elements 0.98956
published_at 2026-04-18T12:55:00Z
9
value 0.7681
scoring_system epss
scoring_elements 0.98957
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1182
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1182
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=668309
reference_id 668309
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=668309
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=804093
reference_id 804093
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=804093
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/21850.rb
reference_id CVE-2012-1182;OSVDB-81303
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/21850.rb
6
reference_url http://www.zerodayinitiative.com/advisories/ZDI-12-069/
reference_id CVE-2012-1182;OSVDB-81303
reference_type exploit
scores
url http://www.zerodayinitiative.com/advisories/ZDI-12-069/
7
reference_url https://security.gentoo.org/glsa/201206-22
reference_id GLSA-201206-22
reference_type
scores
url https://security.gentoo.org/glsa/201206-22
8
reference_url https://access.redhat.com/errata/RHSA-2012:0465
reference_id RHSA-2012:0465
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0465
9
reference_url https://access.redhat.com/errata/RHSA-2012:0466
reference_id RHSA-2012:0466
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0466
10
reference_url https://access.redhat.com/errata/RHSA-2012:0478
reference_id RHSA-2012:0478
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0478
11
reference_url https://access.redhat.com/errata/RHSA-2013:0506
reference_id RHSA-2013:0506
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0506
12
reference_url https://access.redhat.com/errata/RHSA-2013:0515
reference_id RHSA-2013:0515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0515
13
reference_url https://usn.ubuntu.com/1423-1/
reference_id USN-1423-1
reference_type
scores
url https://usn.ubuntu.com/1423-1/
fixed_packages
0
url pkg:deb/debian/samba@2:3.6.4-1?distro=trixie
purl pkg:deb/debian/samba@2:3.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:3.6.4-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-1182
risk_score 1.4
exploitability 2.0
weighted_severity 0.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2uuu-wpye-wufq
12
url VCID-2w26-yjmn-k7an
vulnerability_id VCID-2w26-yjmn-k7an
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20277.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20277.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-20277
reference_id
reference_type
scores
0
value 0.08492
scoring_system epss
scoring_elements 0.92332
published_at 2026-04-01T12:55:00Z
1
value 0.08492
scoring_system epss
scoring_elements 0.92382
published_at 2026-04-21T12:55:00Z
2
value 0.08492
scoring_system epss
scoring_elements 0.92371
published_at 2026-04-12T12:55:00Z
3
value 0.08492
scoring_system epss
scoring_elements 0.92381
published_at 2026-04-16T12:55:00Z
4
value 0.08492
scoring_system epss
scoring_elements 0.9238
published_at 2026-04-18T12:55:00Z
5
value 0.08492
scoring_system epss
scoring_elements 0.92339
published_at 2026-04-02T12:55:00Z
6
value 0.08492
scoring_system epss
scoring_elements 0.92344
published_at 2026-04-04T12:55:00Z
7
value 0.08492
scoring_system epss
scoring_elements 0.92348
published_at 2026-04-07T12:55:00Z
8
value 0.08492
scoring_system epss
scoring_elements 0.92359
published_at 2026-04-08T12:55:00Z
9
value 0.08492
scoring_system epss
scoring_elements 0.92364
published_at 2026-04-09T12:55:00Z
10
value 0.08492
scoring_system epss
scoring_elements 0.92369
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-20277
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10730
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27840
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20277
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1941402
reference_id 1941402
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1941402
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985935
reference_id 985935
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985935
8
reference_url https://security.archlinux.org/AVG-1732
reference_id AVG-1732
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1732
9
reference_url https://security.archlinux.org/AVG-1734
reference_id AVG-1734
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1734
10
reference_url https://security.gentoo.org/glsa/202105-22
reference_id GLSA-202105-22
reference_type
scores
url https://security.gentoo.org/glsa/202105-22
11
reference_url https://access.redhat.com/errata/RHSA-2021:1072
reference_id RHSA-2021:1072
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1072
12
reference_url https://access.redhat.com/errata/RHSA-2021:1197
reference_id RHSA-2021:1197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1197
13
reference_url https://access.redhat.com/errata/RHSA-2021:1213
reference_id RHSA-2021:1213
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1213
14
reference_url https://access.redhat.com/errata/RHSA-2021:1214
reference_id RHSA-2021:1214
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1214
15
reference_url https://access.redhat.com/errata/RHSA-2021:2331
reference_id RHSA-2021:2331
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2331
16
reference_url https://access.redhat.com/errata/RHSA-2021:2786
reference_id RHSA-2021:2786
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2786
17
reference_url https://usn.ubuntu.com/4888-1/
reference_id USN-4888-1
reference_type
scores
url https://usn.ubuntu.com/4888-1/
18
reference_url https://usn.ubuntu.com/4888-2/
reference_id USN-4888-2
reference_type
scores
url https://usn.ubuntu.com/4888-2/
fixed_packages
0
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2021-20277
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2w26-yjmn-k7an
13
url VCID-32gn-2yfd-x7fh
vulnerability_id VCID-32gn-2yfd-x7fh
summary security flaw
references
0
reference_url ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.17/SCOSA-2005.17.txt
reference_id
reference_type
scores
url ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.17/SCOSA-2005.17.txt
1
reference_url ftp://patches.sgi.com/support/free/security/advisories/20041201-01-P
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20041201-01-P
2
reference_url http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000899
reference_id
reference_type
scores
url http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000899
3
reference_url http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html
4
reference_url http://marc.info/?l=bugtraq&m=109993720717957&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=109993720717957&w=2
5
reference_url http://marc.info/?l=bugtraq&m=110330519803655&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=110330519803655&w=2
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0930.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0930.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0930
reference_id
reference_type
scores
0
value 0.06058
scoring_system epss
scoring_elements 0.9076
published_at 2026-04-21T12:55:00Z
1
value 0.06058
scoring_system epss
scoring_elements 0.90697
published_at 2026-04-01T12:55:00Z
2
value 0.06058
scoring_system epss
scoring_elements 0.90702
published_at 2026-04-02T12:55:00Z
3
value 0.06058
scoring_system epss
scoring_elements 0.90713
published_at 2026-04-04T12:55:00Z
4
value 0.06058
scoring_system epss
scoring_elements 0.90723
published_at 2026-04-07T12:55:00Z
5
value 0.06058
scoring_system epss
scoring_elements 0.90734
published_at 2026-04-08T12:55:00Z
6
value 0.06058
scoring_system epss
scoring_elements 0.9074
published_at 2026-04-09T12:55:00Z
7
value 0.06058
scoring_system epss
scoring_elements 0.90749
published_at 2026-04-12T12:55:00Z
8
value 0.06058
scoring_system epss
scoring_elements 0.90745
published_at 2026-04-13T12:55:00Z
9
value 0.06058
scoring_system epss
scoring_elements 0.90764
published_at 2026-04-16T12:55:00Z
10
value 0.06058
scoring_system epss
scoring_elements 0.90762
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0930
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0930
9
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/17987
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/17987
10
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10936
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10936
11
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-101783-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-101783-1
12
reference_url https://www.ubuntu.com/usn/usn-22-1/
reference_id
reference_type
scores
url https://www.ubuntu.com/usn/usn-22-1/
13
reference_url http://www.gentoo.org/security/en/glsa/glsa-200411-21.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200411-21.xml
14
reference_url http://www.idefense.com/application/poi/display?id=156&type=vulnerabilities&flashstatus=false
reference_id
reference_type
scores
url http://www.idefense.com/application/poi/display?id=156&type=vulnerabilities&flashstatus=false
15
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2004:131
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2004:131
16
reference_url http://www.novell.com/linux/security/advisories/2004_40_samba.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2004_40_samba.html
17
reference_url http://www.securityfocus.com/bid/11624
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/11624
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617324
reference_id 1617324
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617324
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sgi:samba:3.0.1:*:irix:*:*:*:*:*
reference_id cpe:2.3:a:sgi:samba:3.0.1:*:irix:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sgi:samba:3.0.1:*:irix:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sgi:samba:3.0.2:*:irix:*:*:*:*:*
reference_id cpe:2.3:a:sgi:samba:3.0.2:*:irix:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sgi:samba:3.0.2:*:irix:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sgi:samba:3.0.3:*:irix:*:*:*:*:*
reference_id cpe:2.3:a:sgi:samba:3.0.3:*:irix:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sgi:samba:3.0.3:*:irix:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sgi:samba:3.0.4:*:irix:*:*:*:*:*
reference_id cpe:2.3:a:sgi:samba:3.0.4:*:irix:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sgi:samba:3.0.4:*:irix:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sgi:samba:3.0.5:*:irix:*:*:*:*:*
reference_id cpe:2.3:a:sgi:samba:3.0.5:*:irix:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sgi:samba:3.0.5:*:irix:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sgi:samba:3.0.6:*:irix:*:*:*:*:*
reference_id cpe:2.3:a:sgi:samba:3.0.6:*:irix:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sgi:samba:3.0.6:*:irix:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sgi:samba:3.0.7:*:irix:*:*:*:*:*
reference_id cpe:2.3:a:sgi:samba:3.0.7:*:irix:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sgi:samba:3.0.7:*:irix:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sgi:samba:3.0:*:irix:*:*:*:*:*
reference_id cpe:2.3:a:sgi:samba:3.0:*:irix:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sgi:samba:3.0:*:irix:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*
reference_id cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/detail/CVE-2004-0930
reference_id CVE-2004-0930
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2004-0930
50
reference_url https://access.redhat.com/errata/RHSA-2004:632
reference_id RHSA-2004:632
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:632
51
reference_url https://usn.ubuntu.com/22-1/
reference_id USN-22-1
reference_type
scores
url https://usn.ubuntu.com/22-1/
fixed_packages
0
url pkg:deb/debian/samba@3.0.8-1?distro=trixie
purl pkg:deb/debian/samba@3.0.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@3.0.8-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2004-0930
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-32gn-2yfd-x7fh
14
url VCID-364y-r11r-u7cm
vulnerability_id VCID-364y-r11r-u7cm
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which may allow execution of arbitrary code with root privileges.
references
0
reference_url http://badlock.org/
reference_id
reference_type
scores
url http://badlock.org/
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html
10
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html
11
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html
12
reference_url http://rhn.redhat.com/errata/RHSA-2016-0611.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0611.html
13
reference_url http://rhn.redhat.com/errata/RHSA-2016-0612.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0612.html
14
reference_url http://rhn.redhat.com/errata/RHSA-2016-0613.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0613.html
15
reference_url http://rhn.redhat.com/errata/RHSA-2016-0614.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0614.html
16
reference_url http://rhn.redhat.com/errata/RHSA-2016-0618.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0618.html
17
reference_url http://rhn.redhat.com/errata/RHSA-2016-0619.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0619.html
18
reference_url http://rhn.redhat.com/errata/RHSA-2016-0620.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0620.html
19
reference_url http://rhn.redhat.com/errata/RHSA-2016-0624.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0624.html
20
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2112.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2112.json
21
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2112
reference_id
reference_type
scores
0
value 0.19642
scoring_system epss
scoring_elements 0.95437
published_at 2026-04-21T12:55:00Z
1
value 0.19642
scoring_system epss
scoring_elements 0.95429
published_at 2026-04-16T12:55:00Z
2
value 0.19642
scoring_system epss
scoring_elements 0.95433
published_at 2026-04-18T12:55:00Z
3
value 0.19642
scoring_system epss
scoring_elements 0.95386
published_at 2026-04-01T12:55:00Z
4
value 0.19642
scoring_system epss
scoring_elements 0.95395
published_at 2026-04-02T12:55:00Z
5
value 0.19642
scoring_system epss
scoring_elements 0.95401
published_at 2026-04-04T12:55:00Z
6
value 0.19642
scoring_system epss
scoring_elements 0.95404
published_at 2026-04-07T12:55:00Z
7
value 0.19642
scoring_system epss
scoring_elements 0.95411
published_at 2026-04-08T12:55:00Z
8
value 0.19642
scoring_system epss
scoring_elements 0.95414
published_at 2026-04-09T12:55:00Z
9
value 0.19642
scoring_system epss
scoring_elements 0.95419
published_at 2026-04-12T12:55:00Z
10
value 0.19642
scoring_system epss
scoring_elements 0.95421
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2112
22
reference_url https://bto.bluecoat.com/security-advisory/sa122
reference_id
reference_type
scores
url https://bto.bluecoat.com/security-advisory/sa122
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2114
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2114
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118
31
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:A/AC:M/Au:N/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
32
reference_url https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05087821
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05087821
33
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05082964
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05082964
34
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399
35
reference_url https://www.samba.org/samba/history/samba-4.2.10.html
reference_id
reference_type
scores
url https://www.samba.org/samba/history/samba-4.2.10.html
36
reference_url https://www.samba.org/samba/latest_news.html#4.4.2
reference_id
reference_type
scores
url https://www.samba.org/samba/latest_news.html#4.4.2
37
reference_url https://www.samba.org/samba/security/CVE-2016-2112.html
reference_id
reference_type
scores
url https://www.samba.org/samba/security/CVE-2016-2112.html
38
reference_url http://www.debian.org/security/2016/dsa-3548
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3548
39
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
40
reference_url http://www.securitytracker.com/id/1035533
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035533
41
reference_url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.458012
reference_id
reference_type
scores
url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.458012
42
reference_url http://www.ubuntu.com/usn/USN-2950-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2950-1
43
reference_url http://www.ubuntu.com/usn/USN-2950-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2950-2
44
reference_url http://www.ubuntu.com/usn/USN-2950-3
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2950-3
45
reference_url http://www.ubuntu.com/usn/USN-2950-4
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2950-4
46
reference_url http://www.ubuntu.com/usn/USN-2950-5
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2950-5
47
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1311903
reference_id 1311903
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1311903
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*
138
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*
139
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*
140
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*
141
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*
142
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*
143
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*
144
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:*
145
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:*
146
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:*
147
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.15:*:*:*:*:*:*:*
148
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.16:*:*:*:*:*:*:*
149
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*
150
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*
151
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*
152
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*
153
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*
154
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*
155
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*
156
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*
157
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*
158
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*
159
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*
160
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*
161
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.12:*:*:*:*:*:*:*
162
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.13:*:*:*:*:*:*:*
163
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.14:*:*:*:*:*:*:*
164
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.15:*:*:*:*:*:*:*
165
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.16:*:*:*:*:*:*:*
166
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.17:*:*:*:*:*:*:*
167
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*
168
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*
169
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*
170
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*
171
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*
172
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*
173
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*
174
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*
175
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*
176
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*
177
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*
178
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*
179
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*
180
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*
181
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.14:*:*:*:*:*:*:*
182
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.15:*:*:*:*:*:*:*
183
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.16:*:*:*:*:*:*:*
184
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.17:*:*:*:*:*:*:*
185
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.18:*:*:*:*:*:*:*
186
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.19:*:*:*:*:*:*:*
187
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*
188
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.20:*:*:*:*:*:*:*
189
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.21:*:*:*:*:*:*:*
190
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.22:*:*:*:*:*:*:*
191
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*
192
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*
193
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*
194
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*
195
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*
196
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*
197
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*
198
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*
199
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*
200
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*
201
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*
202
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*
203
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*
204
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*
205
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*
206
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*
207
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*
208
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*
209
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*
210
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*
211
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*
212
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*
213
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*
214
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*
215
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.24:*:*:*:*:*:*:*
216
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.25:*:*:*:*:*:*:*
217
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*
218
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*
219
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*
220
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*
221
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*
222
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*
223
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*
224
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
225
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*
226
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*
227
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*
228
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*
229
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*
230
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*
231
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*
232
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*
233
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*
234
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*
235
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*
236
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*
237
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*
238
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*
239
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*
240
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*
241
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*
242
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.25:*:*:*:*:*:*:*
243
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.26:*:*:*:*:*:*:*
244
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*
245
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*
246
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*
247
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*
248
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*
249
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*
250
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*
251
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*
252
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*
253
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*
254
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*
255
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*
256
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*
257
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*
258
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*
259
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*
260
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*
261
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*
262
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*
263
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*
264
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*
265
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*
266
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*
267
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.23:*:*:*:*:*:*:*
268
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*
269
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*
270
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*
271
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*
272
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*
273
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*
274
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*
275
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*
276
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*
277
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*
278
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*
279
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*
280
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*
281
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*
282
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*
283
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*
284
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*
285
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*
286
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*
287
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.9:*:*:*:*:*:*:*
288
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*
289
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*
290
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*
291
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*
292
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*
293
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*
294
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.6:*:*:*:*:*:*:*
295
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:*:*:*:*:*:*:*
296
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
297
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
298
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
299
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-2112
reference_id CVE-2016-2112
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-2112
300
reference_url https://security.gentoo.org/glsa/201612-47
reference_id GLSA-201612-47
reference_type
scores
url https://security.gentoo.org/glsa/201612-47
301
reference_url https://access.redhat.com/errata/RHSA-2016:0611
reference_id RHSA-2016:0611
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0611
302
reference_url https://access.redhat.com/errata/RHSA-2016:0612
reference_id RHSA-2016:0612
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0612
303
reference_url https://access.redhat.com/errata/RHSA-2016:0613
reference_id RHSA-2016:0613
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0613
304
reference_url https://access.redhat.com/errata/RHSA-2016:0614
reference_id RHSA-2016:0614
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0614
305
reference_url https://access.redhat.com/errata/RHSA-2016:0618
reference_id RHSA-2016:0618
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0618
306
reference_url https://access.redhat.com/errata/RHSA-2016:0619
reference_id RHSA-2016:0619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0619
307
reference_url https://access.redhat.com/errata/RHSA-2016:0620
reference_id RHSA-2016:0620
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0620
308
reference_url https://access.redhat.com/errata/RHSA-2016:0624
reference_id RHSA-2016:0624
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0624
309
reference_url https://usn.ubuntu.com/2950-1/
reference_id USN-2950-1
reference_type
scores
url https://usn.ubuntu.com/2950-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.3.7%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.3.7%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.3.7%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2016-2112
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-364y-r11r-u7cm
15
url VCID-3du2-evy8-jfa1
vulnerability_id VCID-3du2-evy8-jfa1
summary Multiple vulnerabilities have been discovered in MIT krb5, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42898.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42898.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42898
reference_id
reference_type
scores
0
value 0.08257
scoring_system epss
scoring_elements 0.92245
published_at 2026-04-21T12:55:00Z
1
value 0.08889
scoring_system epss
scoring_elements 0.9254
published_at 2026-04-04T12:55:00Z
2
value 0.08889
scoring_system epss
scoring_elements 0.92532
published_at 2026-04-02T12:55:00Z
3
value 0.08889
scoring_system epss
scoring_elements 0.92575
published_at 2026-04-18T12:55:00Z
4
value 0.08889
scoring_system epss
scoring_elements 0.92565
published_at 2026-04-12T12:55:00Z
5
value 0.08889
scoring_system epss
scoring_elements 0.92564
published_at 2026-04-13T12:55:00Z
6
value 0.08889
scoring_system epss
scoring_elements 0.92558
published_at 2026-04-09T12:55:00Z
7
value 0.08889
scoring_system epss
scoring_elements 0.92553
published_at 2026-04-08T12:55:00Z
8
value 0.08889
scoring_system epss
scoring_elements 0.92542
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42898
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187
reference_id 1024187
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024267
reference_id 1024267
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024267
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2140960
reference_id 2140960
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2140960
12
reference_url https://web.mit.edu/kerberos/advisories/
reference_id advisories
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/
url https://web.mit.edu/kerberos/advisories/
13
reference_url https://security.archlinux.org/AVG-2828
reference_id AVG-2828
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2828
14
reference_url https://www.samba.org/samba/security/CVE-2022-42898.html
reference_id CVE-2022-42898.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/
url https://www.samba.org/samba/security/CVE-2022-42898.html
15
reference_url https://github.com/krb5/krb5/commit/ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583
reference_id ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/
url https://github.com/krb5/krb5/commit/ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583
16
reference_url https://github.com/heimdal/heimdal/security/advisories/GHSA-64mq-fvfj-5x3c
reference_id GHSA-64mq-fvfj-5x3c
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/
url https://github.com/heimdal/heimdal/security/advisories/GHSA-64mq-fvfj-5x3c
17
reference_url https://security.gentoo.org/glsa/202309-06
reference_id GLSA-202309-06
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/
url https://security.gentoo.org/glsa/202309-06
18
reference_url https://security.gentoo.org/glsa/202310-06
reference_id GLSA-202310-06
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/
url https://security.gentoo.org/glsa/202310-06
19
reference_url https://security.gentoo.org/glsa/202405-11
reference_id GLSA-202405-11
reference_type
scores
url https://security.gentoo.org/glsa/202405-11
20
reference_url https://web.mit.edu/kerberos/krb5-1.19/
reference_id krb5-1.19
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/
url https://web.mit.edu/kerberos/krb5-1.19/
21
reference_url https://security.netapp.com/advisory/ntap-20230216-0008/
reference_id ntap-20230216-0008
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/
url https://security.netapp.com/advisory/ntap-20230216-0008/
22
reference_url https://security.netapp.com/advisory/ntap-20230223-0001/
reference_id ntap-20230223-0001
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/
url https://security.netapp.com/advisory/ntap-20230223-0001/
23
reference_url https://web.mit.edu/kerberos/krb5-1.20/README-1.20.1.txt
reference_id README-1.20.1.txt
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/
url https://web.mit.edu/kerberos/krb5-1.20/README-1.20.1.txt
24
reference_url https://access.redhat.com/errata/RHSA-2022:8637
reference_id RHSA-2022:8637
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8637
25
reference_url https://access.redhat.com/errata/RHSA-2022:8638
reference_id RHSA-2022:8638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8638
26
reference_url https://access.redhat.com/errata/RHSA-2022:8639
reference_id RHSA-2022:8639
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8639
27
reference_url https://access.redhat.com/errata/RHSA-2022:8640
reference_id RHSA-2022:8640
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8640
28
reference_url https://access.redhat.com/errata/RHSA-2022:8641
reference_id RHSA-2022:8641
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8641
29
reference_url https://access.redhat.com/errata/RHSA-2022:8648
reference_id RHSA-2022:8648
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8648
30
reference_url https://access.redhat.com/errata/RHSA-2022:8662
reference_id RHSA-2022:8662
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8662
31
reference_url https://access.redhat.com/errata/RHSA-2022:8663
reference_id RHSA-2022:8663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8663
32
reference_url https://access.redhat.com/errata/RHSA-2022:8669
reference_id RHSA-2022:8669
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8669
33
reference_url https://access.redhat.com/errata/RHSA-2022:9029
reference_id RHSA-2022:9029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9029
34
reference_url https://bugzilla.samba.org/show_bug.cgi?id=15203
reference_id show_bug.cgi?id=15203
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/
url https://bugzilla.samba.org/show_bug.cgi?id=15203
35
reference_url https://usn.ubuntu.com/5800-1/
reference_id USN-5800-1
reference_type
scores
url https://usn.ubuntu.com/5800-1/
36
reference_url https://usn.ubuntu.com/5822-1/
reference_id USN-5822-1
reference_type
scores
url https://usn.ubuntu.com/5822-1/
37
reference_url https://usn.ubuntu.com/5828-1/
reference_id USN-5828-1
reference_type
scores
url https://usn.ubuntu.com/5828-1/
38
reference_url https://usn.ubuntu.com/5936-1/
reference_id USN-5936-1
reference_type
scores
url https://usn.ubuntu.com/5936-1/
39
reference_url https://usn.ubuntu.com/7582-1/
reference_id USN-7582-1
reference_type
scores
url https://usn.ubuntu.com/7582-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.17.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.17.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.3%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2022-42898
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3du2-evy8-jfa1
16
url VCID-3mtm-4pp5-3yeg
vulnerability_id VCID-3mtm-4pp5-3yeg
summary
Samba contains multiple vulnerabilities potentially resulting in the
    execution of arbitrary code with root privileges.
references
0
reference_url http://docs.info.apple.com/article.html?artnum=306172
reference_id
reference_type
scores
url http://docs.info.apple.com/article.html?artnum=306172
1
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01067768
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01067768
2
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01078980
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01078980
3
reference_url http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html
4
reference_url http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html
reference_id
reference_type
scores
url http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html
5
reference_url http://lists.suse.com/archive/suse-security-announce/2007-May/0006.html
reference_id
reference_type
scores
url http://lists.suse.com/archive/suse-security-announce/2007-May/0006.html
6
reference_url http://osvdb.org/34699
reference_id
reference_type
scores
url http://osvdb.org/34699
7
reference_url http://osvdb.org/34731
reference_id
reference_type
scores
url http://osvdb.org/34731
8
reference_url http://osvdb.org/34733
reference_id
reference_type
scores
url http://osvdb.org/34733
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2446.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2446.json
10
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-2446
reference_id
reference_type
scores
0
value 0.88952
scoring_system epss
scoring_elements 0.99519
published_at 2026-04-02T12:55:00Z
1
value 0.88952
scoring_system epss
scoring_elements 0.99521
published_at 2026-04-07T12:55:00Z
2
value 0.88952
scoring_system epss
scoring_elements 0.99522
published_at 2026-04-08T12:55:00Z
3
value 0.88952
scoring_system epss
scoring_elements 0.99523
published_at 2026-04-12T12:55:00Z
4
value 0.88952
scoring_system epss
scoring_elements 0.99524
published_at 2026-04-13T12:55:00Z
5
value 0.8905
scoring_system epss
scoring_elements 0.99533
published_at 2026-04-21T12:55:00Z
6
value 0.8905
scoring_system epss
scoring_elements 0.99531
published_at 2026-04-16T12:55:00Z
7
value 0.8905
scoring_system epss
scoring_elements 0.99532
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-2446
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2446
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2446
12
reference_url http://secunia.com/advisories/25232
reference_id
reference_type
scores
url http://secunia.com/advisories/25232
13
reference_url http://secunia.com/advisories/25241
reference_id
reference_type
scores
url http://secunia.com/advisories/25241
14
reference_url http://secunia.com/advisories/25246
reference_id
reference_type
scores
url http://secunia.com/advisories/25246
15
reference_url http://secunia.com/advisories/25251
reference_id
reference_type
scores
url http://secunia.com/advisories/25251
16
reference_url http://secunia.com/advisories/25255
reference_id
reference_type
scores
url http://secunia.com/advisories/25255
17
reference_url http://secunia.com/advisories/25256
reference_id
reference_type
scores
url http://secunia.com/advisories/25256
18
reference_url http://secunia.com/advisories/25257
reference_id
reference_type
scores
url http://secunia.com/advisories/25257
19
reference_url http://secunia.com/advisories/25259
reference_id
reference_type
scores
url http://secunia.com/advisories/25259
20
reference_url http://secunia.com/advisories/25270
reference_id
reference_type
scores
url http://secunia.com/advisories/25270
21
reference_url http://secunia.com/advisories/25289
reference_id
reference_type
scores
url http://secunia.com/advisories/25289
22
reference_url http://secunia.com/advisories/25391/
reference_id
reference_type
scores
url http://secunia.com/advisories/25391/
23
reference_url http://secunia.com/advisories/25567
reference_id
reference_type
scores
url http://secunia.com/advisories/25567
24
reference_url http://secunia.com/advisories/25675
reference_id
reference_type
scores
url http://secunia.com/advisories/25675
25
reference_url http://secunia.com/advisories/25772
reference_id
reference_type
scores
url http://secunia.com/advisories/25772
26
reference_url http://secunia.com/advisories/26235
reference_id
reference_type
scores
url http://secunia.com/advisories/26235
27
reference_url http://secunia.com/advisories/26909
reference_id
reference_type
scores
url http://secunia.com/advisories/26909
28
reference_url http://secunia.com/advisories/27706
reference_id
reference_type
scores
url http://secunia.com/advisories/27706
29
reference_url http://secunia.com/advisories/28292
reference_id
reference_type
scores
url http://secunia.com/advisories/28292
30
reference_url http://security.gentoo.org/glsa/glsa-200705-15.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200705-15.xml
31
reference_url http://securityreason.com/securityalert/2702
reference_id
reference_type
scores
url http://securityreason.com/securityalert/2702
32
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/34309
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/34309
33
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/34311
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/34311
34
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/34312
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/34312
35
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/34314
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/34314
36
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/34316
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/34316
37
reference_url https://issues.rpath.com/browse/RPL-1366
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1366
38
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.475906
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.475906
39
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11415
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11415
40
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102964-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102964-1
41
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-66-200588-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-66-200588-1
42
reference_url http://www.debian.org/security/2007/dsa-1291
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1291
43
reference_url http://www.kb.cert.org/vuls/id/773720
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/773720
44
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:104
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:104
45
reference_url http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html
reference_id
reference_type
scores
url http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html
46
reference_url http://www.osvdb.org/34732
reference_id
reference_type
scores
url http://www.osvdb.org/34732
47
reference_url http://www.redhat.com/support/errata/RHSA-2007-0354.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0354.html
48
reference_url http://www.samba.org/samba/security/CVE-2007-2446.html
reference_id
reference_type
scores
url http://www.samba.org/samba/security/CVE-2007-2446.html
49
reference_url http://www.securityfocus.com/archive/1/468542/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/468542/100/0/threaded
50
reference_url http://www.securityfocus.com/archive/1/468670/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/468670/100/0/threaded
51
reference_url http://www.securityfocus.com/archive/1/468672/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/468672/100/0/threaded
52
reference_url http://www.securityfocus.com/archive/1/468673/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/468673/100/0/threaded
53
reference_url http://www.securityfocus.com/archive/1/468674/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/468674/100/0/threaded
54
reference_url http://www.securityfocus.com/archive/1/468675/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/468675/100/0/threaded
55
reference_url http://www.securityfocus.com/archive/1/468680/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/468680/100/0/threaded
56
reference_url http://www.securityfocus.com/bid/23973
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/23973
57
reference_url http://www.securityfocus.com/bid/24195
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/24195
58
reference_url http://www.securityfocus.com/bid/24196
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/24196
59
reference_url http://www.securityfocus.com/bid/24197
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/24197
60
reference_url http://www.securityfocus.com/bid/24198
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/24198
61
reference_url http://www.securityfocus.com/bid/25159
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/25159
62
reference_url http://www.securitytracker.com/id?1018050
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1018050
63
reference_url http://www.trustix.org/errata/2007/0017/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0017/
64
reference_url http://www.ubuntu.com/usn/usn-460-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-460-1
65
reference_url http://www.vupen.com/english/advisories/2007/1805
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1805
66
reference_url http://www.vupen.com/english/advisories/2007/2079
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2079
67
reference_url http://www.vupen.com/english/advisories/2007/2210
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2210
68
reference_url http://www.vupen.com/english/advisories/2007/2281
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2281
69
reference_url http://www.vupen.com/english/advisories/2007/2732
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2732
70
reference_url http://www.vupen.com/english/advisories/2007/3229
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/3229
71
reference_url http://www.vupen.com/english/advisories/2008/0050
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/0050
72
reference_url http://www.xerox.com/downloads/usa/en/c/cert_XRX08_001.pdf
reference_id
reference_type
scores
url http://www.xerox.com/downloads/usa/en/c/cert_XRX08_001.pdf
73
reference_url http://www.zerodayinitiative.com/advisories/ZDI-07-029.html
reference_id
reference_type
scores
url http://www.zerodayinitiative.com/advisories/ZDI-07-029.html
74
reference_url http://www.zerodayinitiative.com/advisories/ZDI-07-030.html
reference_id
reference_type
scores
url http://www.zerodayinitiative.com/advisories/ZDI-07-030.html
75
reference_url http://www.zerodayinitiative.com/advisories/ZDI-07-031.html
reference_id
reference_type
scores
url http://www.zerodayinitiative.com/advisories/ZDI-07-031.html
76
reference_url http://www.zerodayinitiative.com/advisories/ZDI-07-032.html
reference_id
reference_type
scores
url http://www.zerodayinitiative.com/advisories/ZDI-07-032.html
77
reference_url http://www.zerodayinitiative.com/advisories/ZDI-07-033.html
reference_id
reference_type
scores
url http://www.zerodayinitiative.com/advisories/ZDI-07-033.html
78
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=239429
reference_id 239429
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=239429
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-2446
reference_id CVE-2007-2446
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2007-2446
114
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/16859.rb
reference_id CVE-2007-2446;OSVDB-34699
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/16859.rb
115
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/9950.rb
reference_id CVE-2007-2446;OSVDB-34699
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/9950.rb
116
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/osx/remote/16875.rb
reference_id CVE-2007-2446;OSVDB-34699
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/osx/remote/16875.rb
117
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/solaris/remote/16329.rb
reference_id CVE-2007-2446;OSVDB-34699
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/solaris/remote/16329.rb
118
reference_url https://security.gentoo.org/glsa/200705-15
reference_id GLSA-200705-15
reference_type
scores
url https://security.gentoo.org/glsa/200705-15
119
reference_url https://access.redhat.com/errata/RHSA-2007:0354
reference_id RHSA-2007:0354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0354
120
reference_url https://usn.ubuntu.com/460-1/
reference_id USN-460-1
reference_type
scores
url https://usn.ubuntu.com/460-1/
fixed_packages
0
url pkg:deb/debian/samba@3.0.25-1?distro=trixie
purl pkg:deb/debian/samba@3.0.25-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@3.0.25-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2007-2446
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3mtm-4pp5-3yeg
17
url VCID-3u84-y5nx-bbcn
vulnerability_id VCID-3u84-y5nx-bbcn
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-1318.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-1318.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2002-1318
reference_id
reference_type
scores
0
value 0.75047
scoring_system epss
scoring_elements 0.98862
published_at 2026-04-01T12:55:00Z
1
value 0.75047
scoring_system epss
scoring_elements 0.98864
published_at 2026-04-02T12:55:00Z
2
value 0.75047
scoring_system epss
scoring_elements 0.98866
published_at 2026-04-04T12:55:00Z
3
value 0.75047
scoring_system epss
scoring_elements 0.98868
published_at 2026-04-09T12:55:00Z
4
value 0.75047
scoring_system epss
scoring_elements 0.98869
published_at 2026-04-08T12:55:00Z
5
value 0.75047
scoring_system epss
scoring_elements 0.98871
published_at 2026-04-11T12:55:00Z
6
value 0.75047
scoring_system epss
scoring_elements 0.98872
published_at 2026-04-12T12:55:00Z
7
value 0.75047
scoring_system epss
scoring_elements 0.98873
published_at 2026-04-13T12:55:00Z
8
value 0.75047
scoring_system epss
scoring_elements 0.98875
published_at 2026-04-16T12:55:00Z
9
value 0.75047
scoring_system epss
scoring_elements 0.98876
published_at 2026-04-18T12:55:00Z
10
value 0.75047
scoring_system epss
scoring_elements 0.9888
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2002-1318
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1318
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1616871
reference_id 1616871
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1616871
4
reference_url https://access.redhat.com/errata/RHSA-2002:266
reference_id RHSA-2002:266
reference_type
scores
url https://access.redhat.com/errata/RHSA-2002:266
fixed_packages
0
url pkg:deb/debian/samba@2.2.7?distro=trixie
purl pkg:deb/debian/samba@2.2.7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2.2.7%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2002-1318
risk_score 1.4
exploitability 2.0
weighted_severity 0.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3u84-y5nx-bbcn
18
url VCID-3w4u-k81w-hued
vulnerability_id VCID-3w4u-k81w-hued
summary several
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4475.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4475.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4475
reference_id
reference_type
scores
0
value 0.06144
scoring_system epss
scoring_elements 0.90769
published_at 2026-04-01T12:55:00Z
1
value 0.06144
scoring_system epss
scoring_elements 0.90775
published_at 2026-04-02T12:55:00Z
2
value 0.06144
scoring_system epss
scoring_elements 0.90786
published_at 2026-04-04T12:55:00Z
3
value 0.06144
scoring_system epss
scoring_elements 0.90796
published_at 2026-04-07T12:55:00Z
4
value 0.06144
scoring_system epss
scoring_elements 0.90807
published_at 2026-04-08T12:55:00Z
5
value 0.06144
scoring_system epss
scoring_elements 0.90813
published_at 2026-04-09T12:55:00Z
6
value 0.06144
scoring_system epss
scoring_elements 0.90822
published_at 2026-04-12T12:55:00Z
7
value 0.06144
scoring_system epss
scoring_elements 0.9082
published_at 2026-04-13T12:55:00Z
8
value 0.06144
scoring_system epss
scoring_elements 0.90839
published_at 2026-04-16T12:55:00Z
9
value 0.06144
scoring_system epss
scoring_elements 0.90838
published_at 2026-04-18T12:55:00Z
10
value 0.06902
scoring_system epss
scoring_elements 0.91415
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4475
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4408
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4408
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4475
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1024542
reference_id 1024542
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1024542
5
reference_url https://security.gentoo.org/glsa/201502-15
reference_id GLSA-201502-15
reference_type
scores
url https://security.gentoo.org/glsa/201502-15
6
reference_url https://access.redhat.com/errata/RHSA-2013:1806
reference_id RHSA-2013:1806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1806
7
reference_url https://access.redhat.com/errata/RHSA-2014:0009
reference_id RHSA-2014:0009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0009
8
reference_url https://usn.ubuntu.com/2054-1/
reference_id USN-2054-1
reference_type
scores
url https://usn.ubuntu.com/2054-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.0.11%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.0.11%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.0.11%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2013-4475
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3w4u-k81w-hued
19
url VCID-3yuj-zf63-2kd8
vulnerability_id VCID-3yuj-zf63-2kd8
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0808.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0808.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0808
reference_id
reference_type
scores
0
value 0.07869
scoring_system epss
scoring_elements 0.91973
published_at 2026-04-01T12:55:00Z
1
value 0.07869
scoring_system epss
scoring_elements 0.91981
published_at 2026-04-02T12:55:00Z
2
value 0.07869
scoring_system epss
scoring_elements 0.91989
published_at 2026-04-04T12:55:00Z
3
value 0.07869
scoring_system epss
scoring_elements 0.91995
published_at 2026-04-07T12:55:00Z
4
value 0.07869
scoring_system epss
scoring_elements 0.92007
published_at 2026-04-08T12:55:00Z
5
value 0.07869
scoring_system epss
scoring_elements 0.92011
published_at 2026-04-13T12:55:00Z
6
value 0.07869
scoring_system epss
scoring_elements 0.92014
published_at 2026-04-11T12:55:00Z
7
value 0.07869
scoring_system epss
scoring_elements 0.92015
published_at 2026-04-12T12:55:00Z
8
value 0.07869
scoring_system epss
scoring_elements 0.92029
published_at 2026-04-16T12:55:00Z
9
value 0.07869
scoring_system epss
scoring_elements 0.92026
published_at 2026-04-18T12:55:00Z
10
value 0.07869
scoring_system epss
scoring_elements 0.92023
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0808
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0808
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617298
reference_id 1617298
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617298
4
reference_url https://access.redhat.com/errata/RHSA-2004:467
reference_id RHSA-2004:467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:467
fixed_packages
0
url pkg:deb/debian/samba@3.0.7?distro=trixie
purl pkg:deb/debian/samba@3.0.7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@3.0.7%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2004-0808
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3yuj-zf63-2kd8
20
url VCID-3ywg-xum4-hkdq
vulnerability_id VCID-3ywg-xum4-hkdq
summary (SWAT): Absent CSRF protection in various Samba web configuration formulars
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2522.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2522.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-2522
reference_id
reference_type
scores
0
value 0.18197
scoring_system epss
scoring_elements 0.95208
published_at 2026-04-21T12:55:00Z
1
value 0.18197
scoring_system epss
scoring_elements 0.95195
published_at 2026-04-13T12:55:00Z
2
value 0.18197
scoring_system epss
scoring_elements 0.95203
published_at 2026-04-16T12:55:00Z
3
value 0.18197
scoring_system epss
scoring_elements 0.95207
published_at 2026-04-18T12:55:00Z
4
value 0.18197
scoring_system epss
scoring_elements 0.95174
published_at 2026-04-07T12:55:00Z
5
value 0.18197
scoring_system epss
scoring_elements 0.95182
published_at 2026-04-08T12:55:00Z
6
value 0.18197
scoring_system epss
scoring_elements 0.95185
published_at 2026-04-09T12:55:00Z
7
value 0.18197
scoring_system epss
scoring_elements 0.95191
published_at 2026-04-11T12:55:00Z
8
value 0.18197
scoring_system epss
scoring_elements 0.95192
published_at 2026-04-12T12:55:00Z
9
value 0.19243
scoring_system epss
scoring_elements 0.95337
published_at 2026-04-02T12:55:00Z
10
value 0.19243
scoring_system epss
scoring_elements 0.95343
published_at 2026-04-04T12:55:00Z
11
value 0.19243
scoring_system epss
scoring_elements 0.95327
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-2522
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2522
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=721348
reference_id 721348
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=721348
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/cgi/webapps/17577.txt
reference_id CVE-2011-2522;OSVDB-74071
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/cgi/webapps/17577.txt
5
reference_url https://access.redhat.com/errata/RHSA-2011:1219
reference_id RHSA-2011:1219
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1219
6
reference_url https://access.redhat.com/errata/RHSA-2011:1220
reference_id RHSA-2011:1220
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1220
7
reference_url https://access.redhat.com/errata/RHSA-2011:1221
reference_id RHSA-2011:1221
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1221
8
reference_url https://usn.ubuntu.com/1182-1/
reference_id USN-1182-1
reference_type
scores
url https://usn.ubuntu.com/1182-1/
fixed_packages
0
url pkg:deb/debian/samba@2:3.5.10~dfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:3.5.10~dfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:3.5.10~dfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2011-2522
risk_score 0.4
exploitability 2.0
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3ywg-xum4-hkdq
21
url VCID-41a7-swnr-6yd8
vulnerability_id VCID-41a7-swnr-6yd8
summary samba: potential access to "/" in setups with registry shares enabled
references
0
reference_url http://master.samba.org/samba/ftp/patches/security/samba-3.2.6-CVE-2009-0022.patch
reference_id
reference_type
scores
url http://master.samba.org/samba/ftp/patches/security/samba-3.2.6-CVE-2009-0022.patch
1
reference_url http://osvdb.org/51152
reference_id
reference_type
scores
url http://osvdb.org/51152
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0022.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0022.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0022
reference_id
reference_type
scores
0
value 0.04433
scoring_system epss
scoring_elements 0.89052
published_at 2026-04-21T12:55:00Z
1
value 0.04433
scoring_system epss
scoring_elements 0.8899
published_at 2026-04-01T12:55:00Z
2
value 0.04433
scoring_system epss
scoring_elements 0.88997
published_at 2026-04-02T12:55:00Z
3
value 0.04433
scoring_system epss
scoring_elements 0.89013
published_at 2026-04-04T12:55:00Z
4
value 0.04433
scoring_system epss
scoring_elements 0.89015
published_at 2026-04-07T12:55:00Z
5
value 0.04433
scoring_system epss
scoring_elements 0.89033
published_at 2026-04-08T12:55:00Z
6
value 0.04433
scoring_system epss
scoring_elements 0.89038
published_at 2026-04-09T12:55:00Z
7
value 0.04433
scoring_system epss
scoring_elements 0.8905
published_at 2026-04-11T12:55:00Z
8
value 0.04433
scoring_system epss
scoring_elements 0.89046
published_at 2026-04-12T12:55:00Z
9
value 0.04433
scoring_system epss
scoring_elements 0.89044
published_at 2026-04-13T12:55:00Z
10
value 0.04433
scoring_system epss
scoring_elements 0.89057
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0022
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0022
5
reference_url http://secunia.com/advisories/33379
reference_id
reference_type
scores
url http://secunia.com/advisories/33379
6
reference_url http://secunia.com/advisories/33392
reference_id
reference_type
scores
url http://secunia.com/advisories/33392
7
reference_url http://secunia.com/advisories/33431
reference_id
reference_type
scores
url http://secunia.com/advisories/33431
8
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/47733
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/47733
9
reference_url https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00309.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00309.html
10
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:042
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:042
11
reference_url http://www.samba.org/samba/security/CVE-2009-0022.html
reference_id
reference_type
scores
url http://www.samba.org/samba/security/CVE-2009-0022.html
12
reference_url http://www.securityfocus.com/bid/33118
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/33118
13
reference_url http://www.securitytracker.com/id?1021513
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021513
14
reference_url http://www.vupen.com/english/advisories/2009/0017
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0017
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=479110
reference_id 479110
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=479110
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2009-0022
reference_id CVE-2009-0022
reference_type
scores
0
value 6.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:C/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2009-0022
24
reference_url https://usn.ubuntu.com/702-1/
reference_id USN-702-1
reference_type
scores
url https://usn.ubuntu.com/702-1/
fixed_packages
0
url pkg:deb/debian/samba@2:3.2.5-3?distro=trixie
purl pkg:deb/debian/samba@2:3.2.5-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:3.2.5-3%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2009-0022
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-41a7-swnr-6yd8
22
url VCID-45rp-gyp5-ukfb
vulnerability_id VCID-45rp-gyp5-ukfb
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which allowing a context-dependent attacker to bypass intended file
    restrictions, cause a Denial of Service or execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0240.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0240.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0240
reference_id
reference_type
scores
0
value 0.89539
scoring_system epss
scoring_elements 0.99551
published_at 2026-04-02T12:55:00Z
1
value 0.89539
scoring_system epss
scoring_elements 0.99552
published_at 2026-04-04T12:55:00Z
2
value 0.89539
scoring_system epss
scoring_elements 0.99553
published_at 2026-04-07T12:55:00Z
3
value 0.89694
scoring_system epss
scoring_elements 0.99567
published_at 2026-04-18T12:55:00Z
4
value 0.89694
scoring_system epss
scoring_elements 0.99568
published_at 2026-04-21T12:55:00Z
5
value 0.89708
scoring_system epss
scoring_elements 0.99565
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0240
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0240
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0240
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1191325
reference_id 1191325
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1191325
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779033
reference_id 779033
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779033
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86/dos/36741.py
reference_id CVE-2015-0240;OSVDB-118637
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86/dos/36741.py
6
reference_url https://security.gentoo.org/glsa/201502-15
reference_id GLSA-201502-15
reference_type
scores
url https://security.gentoo.org/glsa/201502-15
7
reference_url https://access.redhat.com/errata/RHSA-2015:0249
reference_id RHSA-2015:0249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0249
8
reference_url https://access.redhat.com/errata/RHSA-2015:0250
reference_id RHSA-2015:0250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0250
9
reference_url https://access.redhat.com/errata/RHSA-2015:0251
reference_id RHSA-2015:0251
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0251
10
reference_url https://access.redhat.com/errata/RHSA-2015:0252
reference_id RHSA-2015:0252
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0252
11
reference_url https://access.redhat.com/errata/RHSA-2015:0253
reference_id RHSA-2015:0253
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0253
12
reference_url https://access.redhat.com/errata/RHSA-2015:0254
reference_id RHSA-2015:0254
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0254
13
reference_url https://access.redhat.com/errata/RHSA-2015:0255
reference_id RHSA-2015:0255
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0255
14
reference_url https://access.redhat.com/errata/RHSA-2015:0256
reference_id RHSA-2015:0256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0256
15
reference_url https://access.redhat.com/errata/RHSA-2015:0257
reference_id RHSA-2015:0257
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0257
16
reference_url https://usn.ubuntu.com/2508-1/
reference_id USN-2508-1
reference_type
scores
url https://usn.ubuntu.com/2508-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.1.17%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.1.17%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.1.17%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2015-0240
risk_score 1.6
exploitability 2.0
weighted_severity 0.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-45rp-gyp5-ukfb
23
url VCID-47k4-8k1s-zff2
vulnerability_id VCID-47k4-8k1s-zff2
summary Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23192.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23192.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-23192
reference_id
reference_type
scores
0
value 0.00106
scoring_system epss
scoring_elements 0.28604
published_at 2026-04-21T12:55:00Z
1
value 0.00106
scoring_system epss
scoring_elements 0.28652
published_at 2026-04-18T12:55:00Z
2
value 0.0012
scoring_system epss
scoring_elements 0.31002
published_at 2026-04-01T12:55:00Z
3
value 0.0012
scoring_system epss
scoring_elements 0.31128
published_at 2026-04-02T12:55:00Z
4
value 0.0012
scoring_system epss
scoring_elements 0.31176
published_at 2026-04-04T12:55:00Z
5
value 0.0012
scoring_system epss
scoring_elements 0.30996
published_at 2026-04-07T12:55:00Z
6
value 0.0012
scoring_system epss
scoring_elements 0.31052
published_at 2026-04-08T12:55:00Z
7
value 0.0012
scoring_system epss
scoring_elements 0.31081
published_at 2026-04-09T12:55:00Z
8
value 0.0012
scoring_system epss
scoring_elements 0.31088
published_at 2026-04-11T12:55:00Z
9
value 0.0012
scoring_system epss
scoring_elements 0.31044
published_at 2026-04-12T12:55:00Z
10
value 0.0012
scoring_system epss
scoring_elements 0.30999
published_at 2026-04-13T12:55:00Z
11
value 0.0012
scoring_system epss
scoring_elements 0.3103
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-23192
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2019666
reference_id 2019666
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2019666
12
reference_url https://security.archlinux.org/AVG-2538
reference_id AVG-2538
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2538
13
reference_url https://security.gentoo.org/glsa/202309-06
reference_id GLSA-202309-06
reference_type
scores
url https://security.gentoo.org/glsa/202309-06
14
reference_url https://access.redhat.com/errata/RHSA-2021:4843
reference_id RHSA-2021:4843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4843
15
reference_url https://access.redhat.com/errata/RHSA-2021:5082
reference_id RHSA-2021:5082
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5082
16
reference_url https://access.redhat.com/errata/RHSA-2022:0008
reference_id RHSA-2022:0008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0008
17
reference_url https://usn.ubuntu.com/5142-1/
reference_id USN-5142-1
reference_type
scores
url https://usn.ubuntu.com/5142-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u2?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u2%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.13.14%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.13.14%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.14%252Bdfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
6
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2021-23192
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-47k4-8k1s-zff2
24
url VCID-4ag6-6svz-8qa3
vulnerability_id VCID-4ag6-6svz-8qa3
summary Multiple vulnerabilities have been discovered in Samba, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3347.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3347.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3347
reference_id
reference_type
scores
0
value 0.00419
scoring_system epss
scoring_elements 0.61908
published_at 2026-04-21T12:55:00Z
1
value 0.00419
scoring_system epss
scoring_elements 0.61822
published_at 2026-04-02T12:55:00Z
2
value 0.00419
scoring_system epss
scoring_elements 0.61909
published_at 2026-04-11T12:55:00Z
3
value 0.00419
scoring_system epss
scoring_elements 0.61897
published_at 2026-04-12T12:55:00Z
4
value 0.00419
scoring_system epss
scoring_elements 0.61877
published_at 2026-04-13T12:55:00Z
5
value 0.00419
scoring_system epss
scoring_elements 0.6192
published_at 2026-04-16T12:55:00Z
6
value 0.00419
scoring_system epss
scoring_elements 0.61925
published_at 2026-04-18T12:55:00Z
7
value 0.00419
scoring_system epss
scoring_elements 0.61853
published_at 2026-04-04T12:55:00Z
8
value 0.00419
scoring_system epss
scoring_elements 0.61823
published_at 2026-04-07T12:55:00Z
9
value 0.00419
scoring_system epss
scoring_elements 0.61872
published_at 2026-04-08T12:55:00Z
10
value 0.00419
scoring_system epss
scoring_elements 0.61888
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3347
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2222792
reference_id 2222792
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T13:37:21Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2222792
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::resilientstorage
reference_id cpe:/a:redhat:enterprise_linux:9::resilientstorage
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::resilientstorage
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:storage:3
reference_id cpe:/a:redhat:storage:3
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:storage:3
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
14
reference_url https://access.redhat.com/security/cve/CVE-2023-3347
reference_id CVE-2023-3347
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T13:37:21Z/
url https://access.redhat.com/security/cve/CVE-2023-3347
15
reference_url https://www.samba.org/samba/security/CVE-2023-3347.html
reference_id CVE-2023-3347.html
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T13:37:21Z/
url https://www.samba.org/samba/security/CVE-2023-3347.html
16
reference_url https://security.gentoo.org/glsa/202402-28
reference_id GLSA-202402-28
reference_type
scores
url https://security.gentoo.org/glsa/202402-28
17
reference_url https://access.redhat.com/errata/RHSA-2023:4325
reference_id RHSA-2023:4325
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T13:37:21Z/
url https://access.redhat.com/errata/RHSA-2023:4325
18
reference_url https://access.redhat.com/errata/RHSA-2023:4328
reference_id RHSA-2023:4328
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T13:37:21Z/
url https://access.redhat.com/errata/RHSA-2023:4328
19
reference_url https://usn.ubuntu.com/6238-1/
reference_id USN-6238-1
reference_type
scores
url https://usn.ubuntu.com/6238-1/
fixed_packages
0
url pkg:deb/debian/samba@0?distro=trixie
purl pkg:deb/debian/samba@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@0%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.10%2Bdfsg-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/samba@2:4.17.10%2Bdfsg-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.10%252Bdfsg-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.18.5%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.18.5%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.18.5%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
7
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2023-3347
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4ag6-6svz-8qa3
25
url VCID-4md4-jrs9-17ek
vulnerability_id VCID-4md4-jrs9-17ek
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0201.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0201.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2003-0201
reference_id
reference_type
scores
0
value 0.83963
scoring_system epss
scoring_elements 0.99295
published_at 2026-04-02T12:55:00Z
1
value 0.83963
scoring_system epss
scoring_elements 0.99298
published_at 2026-04-04T12:55:00Z
2
value 0.83963
scoring_system epss
scoring_elements 0.993
published_at 2026-04-07T12:55:00Z
3
value 0.83963
scoring_system epss
scoring_elements 0.99301
published_at 2026-04-08T12:55:00Z
4
value 0.83963
scoring_system epss
scoring_elements 0.99302
published_at 2026-04-09T12:55:00Z
5
value 0.83963
scoring_system epss
scoring_elements 0.99303
published_at 2026-04-13T12:55:00Z
6
value 0.83963
scoring_system epss
scoring_elements 0.99304
published_at 2026-04-21T12:55:00Z
7
value 0.83963
scoring_system epss
scoring_elements 0.99305
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2003-0201
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0201
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0201
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617002
reference_id 1617002
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617002
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd_x86/remote/16880.rb
reference_id CVE-2003-0201;OSVDB-4469
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd_x86/remote/16880.rb
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86/remote/16861.rb
reference_id CVE-2003-0201;OSVDB-4469
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86/remote/16861.rb
6
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/osx_ppc/remote/16876.rb
reference_id CVE-2003-0201;OSVDB-4469
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/osx_ppc/remote/16876.rb
7
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/osx/remote/9924.rb
reference_id CVE-2003-0201;OSVDB-4469
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/osx/remote/9924.rb
8
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/solaris_sparc/remote/16330.rb
reference_id CVE-2003-0201;OSVDB-4469
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/solaris_sparc/remote/16330.rb
9
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/remote/22468.c
reference_id CVE-2003-0201;OSVDB-4469
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/remote/22468.c
10
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/remote/22469.c
reference_id CVE-2003-0201;OSVDB-4469
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/remote/22469.c
11
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/remote/22470.c
reference_id CVE-2003-0201;OSVDB-4469
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/remote/22470.c
12
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/remote/22471.txt
reference_id CVE-2003-0201;OSVDB-4469
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/remote/22471.txt
13
reference_url https://www.securityfocus.com/bid/7294/info
reference_id CVE-2003-0201;OSVDB-4469
reference_type exploit
scores
url https://www.securityfocus.com/bid/7294/info
14
reference_url http://www.digitaldefense.net/labs/advisories/DDI-1013.txt
reference_id CVE-2003-0201;OSVDB-4469
reference_type exploit
scores
url http://www.digitaldefense.net/labs/advisories/DDI-1013.txt
15
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/55.c
reference_id OSVDB-4469;CVE-2003-0201
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/55.c
16
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/7.pl
reference_id OSVDB-4469;CVE-2003-0201
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/7.pl
17
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/10.c
reference_id OSVDB-4469;CVE-2003-0201
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/10.c
18
reference_url https://access.redhat.com/errata/RHSA-2003:137
reference_id RHSA-2003:137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:137
19
reference_url https://access.redhat.com/errata/RHSA-2003:138
reference_id RHSA-2003:138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:138
20
reference_url https://access.redhat.com/errata/RHSA-2003:226
reference_id RHSA-2003:226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:226
fixed_packages
0
url pkg:deb/debian/samba@3.0?distro=trixie
purl pkg:deb/debian/samba@3.0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@3.0%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2003-0201
risk_score 1.6
exploitability 2.0
weighted_severity 0.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4md4-jrs9-17ek
26
url VCID-4mdk-6qnf-r7f7
vulnerability_id VCID-4mdk-6qnf-r7f7
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which may allow execution of arbitrary code with root privileges.
references
0
reference_url http://badlock.org/
reference_id
reference_type
scores
url http://badlock.org/
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0612.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0612.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-0614.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0614.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-0618.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0618.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-0620.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0620.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2114.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2114.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2114
reference_id
reference_type
scores
0
value 0.09085
scoring_system epss
scoring_elements 0.92673
published_at 2026-04-21T12:55:00Z
1
value 0.09085
scoring_system epss
scoring_elements 0.92656
published_at 2026-04-13T12:55:00Z
2
value 0.09085
scoring_system epss
scoring_elements 0.92669
published_at 2026-04-18T12:55:00Z
3
value 0.09085
scoring_system epss
scoring_elements 0.92622
published_at 2026-04-01T12:55:00Z
4
value 0.09085
scoring_system epss
scoring_elements 0.92629
published_at 2026-04-02T12:55:00Z
5
value 0.09085
scoring_system epss
scoring_elements 0.92635
published_at 2026-04-04T12:55:00Z
6
value 0.09085
scoring_system epss
scoring_elements 0.92636
published_at 2026-04-07T12:55:00Z
7
value 0.09085
scoring_system epss
scoring_elements 0.92647
published_at 2026-04-08T12:55:00Z
8
value 0.09085
scoring_system epss
scoring_elements 0.92651
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2114
12
reference_url https://bto.bluecoat.com/security-advisory/sa122
reference_id
reference_type
scores
url https://bto.bluecoat.com/security-advisory/sa122
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2114
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2114
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118
21
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
22
reference_url https://www.samba.org/samba/history/samba-4.2.10.html
reference_id
reference_type
scores
url https://www.samba.org/samba/history/samba-4.2.10.html
23
reference_url https://www.samba.org/samba/latest_news.html#4.4.2
reference_id
reference_type
scores
url https://www.samba.org/samba/latest_news.html#4.4.2
24
reference_url https://www.samba.org/samba/security/CVE-2016-2114.html
reference_id
reference_type
scores
url https://www.samba.org/samba/security/CVE-2016-2114.html
25
reference_url http://www.debian.org/security/2016/dsa-3548
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3548
26
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
27
reference_url http://www.securityfocus.com/bid/86011
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/86011
28
reference_url http://www.securitytracker.com/id/1035533
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035533
29
reference_url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.458012
reference_id
reference_type
scores
url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.458012
30
reference_url http://www.ubuntu.com/usn/USN-2950-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2950-1
31
reference_url http://www.ubuntu.com/usn/USN-2950-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2950-2
32
reference_url http://www.ubuntu.com/usn/USN-2950-3
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2950-3
33
reference_url http://www.ubuntu.com/usn/USN-2950-4
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2950-4
34
reference_url http://www.ubuntu.com/usn/USN-2950-5
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2950-5
35
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1312082
reference_id 1312082
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1312082
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.25:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.26:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.23:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.9:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.6:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
111
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-2114
reference_id CVE-2016-2114
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-2114
112
reference_url https://security.gentoo.org/glsa/201612-47
reference_id GLSA-201612-47
reference_type
scores
url https://security.gentoo.org/glsa/201612-47
113
reference_url https://access.redhat.com/errata/RHSA-2016:0612
reference_id RHSA-2016:0612
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0612
114
reference_url https://access.redhat.com/errata/RHSA-2016:0614
reference_id RHSA-2016:0614
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0614
115
reference_url https://access.redhat.com/errata/RHSA-2016:0618
reference_id RHSA-2016:0618
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0618
116
reference_url https://access.redhat.com/errata/RHSA-2016:0620
reference_id RHSA-2016:0620
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0620
117
reference_url https://usn.ubuntu.com/2950-1/
reference_id USN-2950-1
reference_type
scores
url https://usn.ubuntu.com/2950-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.3.7%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.3.7%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.3.7%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2016-2114
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4mdk-6qnf-r7f7
27
url VCID-4qm6-a9un-nyda
vulnerability_id VCID-4qm6-a9un-nyda
summary samba: samba AD DC LDAP denial of service via dirsync
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14847.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14847.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-14847
reference_id
reference_type
scores
0
value 0.02434
scoring_system epss
scoring_elements 0.8509
published_at 2026-04-01T12:55:00Z
1
value 0.02434
scoring_system epss
scoring_elements 0.85183
published_at 2026-04-18T12:55:00Z
2
value 0.02434
scoring_system epss
scoring_elements 0.85152
published_at 2026-04-09T12:55:00Z
3
value 0.02434
scoring_system epss
scoring_elements 0.85167
published_at 2026-04-11T12:55:00Z
4
value 0.02434
scoring_system epss
scoring_elements 0.85164
published_at 2026-04-12T12:55:00Z
5
value 0.02434
scoring_system epss
scoring_elements 0.85161
published_at 2026-04-13T12:55:00Z
6
value 0.02434
scoring_system epss
scoring_elements 0.85182
published_at 2026-04-21T12:55:00Z
7
value 0.02434
scoring_system epss
scoring_elements 0.85103
published_at 2026-04-02T12:55:00Z
8
value 0.02434
scoring_system epss
scoring_elements 0.8512
published_at 2026-04-04T12:55:00Z
9
value 0.02434
scoring_system epss
scoring_elements 0.85124
published_at 2026-04-07T12:55:00Z
10
value 0.02434
scoring_system epss
scoring_elements 0.85145
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-14847
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14847
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14847
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14847
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14847
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html
7
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKPYHDFI7HRELVXBE5J4MTGSI35AKFBI/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKPYHDFI7HRELVXBE5J4MTGSI35AKFBI/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3IUACPZJXSC4OM6P2V4IC4QMZQZWPD/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3IUACPZJXSC4OM6P2V4IC4QMZQZWPD/
10
reference_url https://www.samba.org/samba/security/CVE-2019-14847.html
reference_id
reference_type
scores
url https://www.samba.org/samba/security/CVE-2019-14847.html
11
reference_url https://www.synology.com/security/advisory/Synology_SA_19_35
reference_id
reference_type
scores
url https://www.synology.com/security/advisory/Synology_SA_19_35
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1764142
reference_id 1764142
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1764142
13
reference_url https://security.archlinux.org/ASA-201911-6
reference_id ASA-201911-6
reference_type
scores
url https://security.archlinux.org/ASA-201911-6
14
reference_url https://security.archlinux.org/AVG-1057
reference_id AVG-1057
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1057
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-14847
reference_id CVE-2019-14847
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
2
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-14847
20
reference_url https://usn.ubuntu.com/4167-1/
reference_id USN-4167-1
reference_type
scores
url https://usn.ubuntu.com/4167-1/
21
reference_url https://usn.ubuntu.com/4167-2/
reference_id USN-4167-2
reference_type
scores
url https://usn.ubuntu.com/4167-2/
fixed_packages
0
url pkg:deb/debian/samba@2:4.11.0%2Bdfsg-6?distro=trixie
purl pkg:deb/debian/samba@2:4.11.0%2Bdfsg-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.11.0%252Bdfsg-6%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2019-14847
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4qm6-a9un-nyda
28
url VCID-4qt5-n4pb-gybp
vulnerability_id VCID-4qt5-n4pb-gybp
summary
Samba has a bug with out of sequence print change notification requests,
    but it cannot be used to perform a remote denial of service attack.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0829.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0829.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0829
reference_id
reference_type
scores
0
value 0.03962
scoring_system epss
scoring_elements 0.88313
published_at 2026-04-01T12:55:00Z
1
value 0.03962
scoring_system epss
scoring_elements 0.88321
published_at 2026-04-02T12:55:00Z
2
value 0.03962
scoring_system epss
scoring_elements 0.88336
published_at 2026-04-04T12:55:00Z
3
value 0.03962
scoring_system epss
scoring_elements 0.88341
published_at 2026-04-07T12:55:00Z
4
value 0.03962
scoring_system epss
scoring_elements 0.8836
published_at 2026-04-08T12:55:00Z
5
value 0.03962
scoring_system epss
scoring_elements 0.88366
published_at 2026-04-09T12:55:00Z
6
value 0.03962
scoring_system epss
scoring_elements 0.88377
published_at 2026-04-11T12:55:00Z
7
value 0.03962
scoring_system epss
scoring_elements 0.88369
published_at 2026-04-13T12:55:00Z
8
value 0.03962
scoring_system epss
scoring_elements 0.88383
published_at 2026-04-16T12:55:00Z
9
value 0.03962
scoring_system epss
scoring_elements 0.8838
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0829
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0829
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0829
3
reference_url https://security.gentoo.org/glsa/200409-14
reference_id GLSA-200409-14
reference_type
scores
url https://security.gentoo.org/glsa/200409-14
fixed_packages
0
url pkg:deb/debian/samba@2.2.11?distro=trixie
purl pkg:deb/debian/samba@2.2.11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2.2.11%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2004-0829
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4qt5-n4pb-gybp
29
url VCID-4v8q-akyc-k7hn
vulnerability_id VCID-4v8q-akyc-k7hn
summary security update
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178730.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178730.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178764.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178764.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-March/180000.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-March/180000.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00063.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00063.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00064.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00064.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00065.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00065.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00081.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00081.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00090.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00090.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00092.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00092.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html
10
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html
11
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html
12
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7560.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7560.json
13
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7560
reference_id
reference_type
scores
0
value 0.03995
scoring_system epss
scoring_elements 0.88429
published_at 2026-04-21T12:55:00Z
1
value 0.03995
scoring_system epss
scoring_elements 0.88434
published_at 2026-04-16T12:55:00Z
2
value 0.03995
scoring_system epss
scoring_elements 0.88431
published_at 2026-04-18T12:55:00Z
3
value 0.03995
scoring_system epss
scoring_elements 0.8837
published_at 2026-04-01T12:55:00Z
4
value 0.03995
scoring_system epss
scoring_elements 0.88379
published_at 2026-04-02T12:55:00Z
5
value 0.03995
scoring_system epss
scoring_elements 0.88387
published_at 2026-04-04T12:55:00Z
6
value 0.03995
scoring_system epss
scoring_elements 0.88392
published_at 2026-04-07T12:55:00Z
7
value 0.03995
scoring_system epss
scoring_elements 0.88411
published_at 2026-04-08T12:55:00Z
8
value 0.03995
scoring_system epss
scoring_elements 0.88417
published_at 2026-04-09T12:55:00Z
9
value 0.03995
scoring_system epss
scoring_elements 0.88428
published_at 2026-04-11T12:55:00Z
10
value 0.03995
scoring_system epss
scoring_elements 0.8842
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7560
14
reference_url https://bugzilla.samba.org/show_bug.cgi?id=11648
reference_id
reference_type
scores
url https://bugzilla.samba.org/show_bug.cgi?id=11648
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7560
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7560
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0771
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:A/AC:M/Au:S/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05121842
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05121842
19
reference_url https://www.samba.org/samba/security/CVE-2015-7560.html
reference_id
reference_type
scores
url https://www.samba.org/samba/security/CVE-2015-7560.html
20
reference_url http://www.debian.org/security/2016/dsa-3514
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3514
21
reference_url http://www.securityfocus.com/bid/84267
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/84267
22
reference_url http://www.securitytracker.com/id/1035220
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035220
23
reference_url http://www.ubuntu.com/usn/USN-2922-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2922-1
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1309992
reference_id 1309992
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1309992
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.4.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:rc1:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.4.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:rc2:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.4.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:rc3:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7560
reference_id CVE-2015-7560
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:P/A:N
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-7560
35
reference_url https://access.redhat.com/errata/RHSA-2016:0447
reference_id RHSA-2016:0447
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0447
36
reference_url https://access.redhat.com/errata/RHSA-2016:0448
reference_id RHSA-2016:0448
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0448
37
reference_url https://access.redhat.com/errata/RHSA-2016:0449
reference_id RHSA-2016:0449
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0449
38
reference_url https://usn.ubuntu.com/2922-1/
reference_id USN-2922-1
reference_type
scores
url https://usn.ubuntu.com/2922-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.3.6%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.3.6%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.3.6%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2015-7560
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4v8q-akyc-k7hn
30
url VCID-55zj-6b4s-8ker
vulnerability_id VCID-55zj-6b4s-8ker
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14902.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14902.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-14902
reference_id
reference_type
scores
0
value 0.03503
scoring_system epss
scoring_elements 0.87558
published_at 2026-04-01T12:55:00Z
1
value 0.03503
scoring_system epss
scoring_elements 0.87567
published_at 2026-04-02T12:55:00Z
2
value 0.03503
scoring_system epss
scoring_elements 0.87581
published_at 2026-04-04T12:55:00Z
3
value 0.03503
scoring_system epss
scoring_elements 0.87583
published_at 2026-04-07T12:55:00Z
4
value 0.03503
scoring_system epss
scoring_elements 0.87602
published_at 2026-04-08T12:55:00Z
5
value 0.03503
scoring_system epss
scoring_elements 0.87609
published_at 2026-04-09T12:55:00Z
6
value 0.03503
scoring_system epss
scoring_elements 0.8762
published_at 2026-04-11T12:55:00Z
7
value 0.03503
scoring_system epss
scoring_elements 0.87615
published_at 2026-04-12T12:55:00Z
8
value 0.03503
scoring_system epss
scoring_elements 0.87612
published_at 2026-04-13T12:55:00Z
9
value 0.03503
scoring_system epss
scoring_elements 0.87627
published_at 2026-04-16T12:55:00Z
10
value 0.03503
scoring_system epss
scoring_elements 0.87628
published_at 2026-04-18T12:55:00Z
11
value 0.03503
scoring_system epss
scoring_elements 0.87625
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-14902
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14902
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14902
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1791201
reference_id 1791201
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1791201
5
reference_url https://security.gentoo.org/glsa/202003-52
reference_id GLSA-202003-52
reference_type
scores
url https://security.gentoo.org/glsa/202003-52
6
reference_url https://usn.ubuntu.com/4244-1/
reference_id USN-4244-1
reference_type
scores
url https://usn.ubuntu.com/4244-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.11.5%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.11.5%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.11.5%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2019-14902
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-55zj-6b4s-8ker
31
url VCID-5cd3-497h-qkhw
vulnerability_id VCID-5cd3-497h-qkhw
summary Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38023.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38023.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-38023
reference_id
reference_type
scores
0
value 0.00354
scoring_system epss
scoring_elements 0.57787
published_at 2026-04-09T12:55:00Z
1
value 0.00354
scoring_system epss
scoring_elements 0.57804
published_at 2026-04-11T12:55:00Z
2
value 0.00354
scoring_system epss
scoring_elements 0.57782
published_at 2026-04-12T12:55:00Z
3
value 0.00354
scoring_system epss
scoring_elements 0.57761
published_at 2026-04-13T12:55:00Z
4
value 0.00354
scoring_system epss
scoring_elements 0.57789
published_at 2026-04-16T12:55:00Z
5
value 0.00354
scoring_system epss
scoring_elements 0.57735
published_at 2026-04-02T12:55:00Z
6
value 0.00354
scoring_system epss
scoring_elements 0.57757
published_at 2026-04-04T12:55:00Z
7
value 0.00354
scoring_system epss
scoring_elements 0.5773
published_at 2026-04-07T12:55:00Z
8
value 0.00354
scoring_system epss
scoring_elements 0.57785
published_at 2026-04-08T12:55:00Z
9
value 0.00481
scoring_system epss
scoring_elements 0.65134
published_at 2026-04-21T12:55:00Z
10
value 0.00481
scoring_system epss
scoring_elements 0.6515
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-38023
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38023
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2154362
reference_id 2154362
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2154362
5
reference_url https://security.archlinux.org/AVG-2828
reference_id AVG-2828
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2828
6
reference_url https://security.gentoo.org/glsa/202309-06
reference_id GLSA-202309-06
reference_type
scores
url https://security.gentoo.org/glsa/202309-06
7
reference_url https://access.redhat.com/errata/RHSA-2023:0637
reference_id RHSA-2023:0637
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0637
8
reference_url https://access.redhat.com/errata/RHSA-2023:0638
reference_id RHSA-2023:0638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0638
9
reference_url https://access.redhat.com/errata/RHSA-2023:0639
reference_id RHSA-2023:0639
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0639
10
reference_url https://access.redhat.com/errata/RHSA-2023:0838
reference_id RHSA-2023:0838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0838
11
reference_url https://access.redhat.com/errata/RHSA-2023:1090
reference_id RHSA-2023:1090
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1090
12
reference_url https://access.redhat.com/errata/RHSA-2023:2127
reference_id RHSA-2023:2127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2127
13
reference_url https://access.redhat.com/errata/RHSA-2023:2136
reference_id RHSA-2023:2136
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2136
14
reference_url https://access.redhat.com/errata/RHSA-2023:2137
reference_id RHSA-2023:2137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2137
15
reference_url https://access.redhat.com/errata/RHSA-2023:3491
reference_id RHSA-2023:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3491
16
reference_url https://usn.ubuntu.com/5822-1/
reference_id USN-5822-1
reference_type
scores
url https://usn.ubuntu.com/5822-1/
17
reference_url https://usn.ubuntu.com/5936-1/
reference_id USN-5936-1
reference_type
scores
url https://usn.ubuntu.com/5936-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.17.4%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.17.4%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.4%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2022-38023
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5cd3-497h-qkhw
32
url VCID-5kvv-rbas-tbh9
vulnerability_id VCID-5kvv-rbas-tbh9
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12163.json
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12163.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12163
reference_id
reference_type
scores
0
value 0.41375
scoring_system epss
scoring_elements 0.97375
published_at 2026-04-01T12:55:00Z
1
value 0.41375
scoring_system epss
scoring_elements 0.97409
published_at 2026-04-21T12:55:00Z
2
value 0.41375
scoring_system epss
scoring_elements 0.97398
published_at 2026-04-13T12:55:00Z
3
value 0.41375
scoring_system epss
scoring_elements 0.97406
published_at 2026-04-16T12:55:00Z
4
value 0.41375
scoring_system epss
scoring_elements 0.97382
published_at 2026-04-02T12:55:00Z
5
value 0.41375
scoring_system epss
scoring_elements 0.97386
published_at 2026-04-04T12:55:00Z
6
value 0.41375
scoring_system epss
scoring_elements 0.97387
published_at 2026-04-07T12:55:00Z
7
value 0.41375
scoring_system epss
scoring_elements 0.97394
published_at 2026-04-08T12:55:00Z
8
value 0.41375
scoring_system epss
scoring_elements 0.97395
published_at 2026-04-09T12:55:00Z
9
value 0.41375
scoring_system epss
scoring_elements 0.97397
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12163
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12150
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12150
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12151
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12163
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12163
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:N/A:N
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1491206
reference_id 1491206
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1491206
7
reference_url https://access.redhat.com/errata/RHSA-2017:2789
reference_id RHSA-2017:2789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2789
8
reference_url https://access.redhat.com/errata/RHSA-2017:2790
reference_id RHSA-2017:2790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2790
9
reference_url https://access.redhat.com/errata/RHSA-2017:2791
reference_id RHSA-2017:2791
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2791
10
reference_url https://access.redhat.com/errata/RHSA-2017:2858
reference_id RHSA-2017:2858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2858
11
reference_url https://usn.ubuntu.com/3426-1/
reference_id USN-3426-1
reference_type
scores
url https://usn.ubuntu.com/3426-1/
12
reference_url https://usn.ubuntu.com/3426-2/
reference_id USN-3426-2
reference_type
scores
url https://usn.ubuntu.com/3426-2/
fixed_packages
0
url pkg:deb/debian/samba@2:4.6.7%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.6.7%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.6.7%252Bdfsg-2%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2017-12163
risk_score 1.9
exploitability 0.5
weighted_severity 3.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5kvv-rbas-tbh9
33
url VCID-5trn-33z3-pudr
vulnerability_id VCID-5trn-33z3-pudr
summary
A large number of share connection requests could cause a Denial of Service
    within Samba.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3403.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3403.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-3403
reference_id
reference_type
scores
0
value 0.29763
scoring_system epss
scoring_elements 0.96599
published_at 2026-04-01T12:55:00Z
1
value 0.29763
scoring_system epss
scoring_elements 0.96608
published_at 2026-04-02T12:55:00Z
2
value 0.29763
scoring_system epss
scoring_elements 0.96613
published_at 2026-04-04T12:55:00Z
3
value 0.29763
scoring_system epss
scoring_elements 0.96617
published_at 2026-04-07T12:55:00Z
4
value 0.29763
scoring_system epss
scoring_elements 0.96625
published_at 2026-04-08T12:55:00Z
5
value 0.29763
scoring_system epss
scoring_elements 0.96627
published_at 2026-04-09T12:55:00Z
6
value 0.29763
scoring_system epss
scoring_elements 0.96629
published_at 2026-04-11T12:55:00Z
7
value 0.29763
scoring_system epss
scoring_elements 0.9663
published_at 2026-04-12T12:55:00Z
8
value 0.29763
scoring_system epss
scoring_elements 0.96632
published_at 2026-04-13T12:55:00Z
9
value 0.29763
scoring_system epss
scoring_elements 0.96639
published_at 2026-04-16T12:55:00Z
10
value 0.29763
scoring_system epss
scoring_elements 0.96644
published_at 2026-04-18T12:55:00Z
11
value 0.29763
scoring_system epss
scoring_elements 0.96648
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-3403
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3403
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618140
reference_id 1618140
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618140
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=378070
reference_id 378070
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=378070
5
reference_url https://security.gentoo.org/glsa/200607-10
reference_id GLSA-200607-10
reference_type
scores
url https://security.gentoo.org/glsa/200607-10
6
reference_url https://access.redhat.com/errata/RHSA-2006:0591
reference_id RHSA-2006:0591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0591
7
reference_url https://usn.ubuntu.com/314-1/
reference_id USN-314-1
reference_type
scores
url https://usn.ubuntu.com/314-1/
fixed_packages
0
url pkg:deb/debian/samba@3.0.23a-1?distro=trixie
purl pkg:deb/debian/samba@3.0.23a-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@3.0.23a-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2006-3403
risk_score 0.1
exploitability 0.5
weighted_severity 0.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5trn-33z3-pudr
34
url VCID-5u1s-egmw-5ufq
vulnerability_id VCID-5u1s-egmw-5ufq
summary
Samba contains multiple vulnerabilities potentially resulting in the
    execution of arbitrary code with root privileges.
references
0
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01078980
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01078980
1
reference_url http://lists.suse.com/archive/suse-security-announce/2007-May/0006.html
reference_id
reference_type
scores
url http://lists.suse.com/archive/suse-security-announce/2007-May/0006.html
2
reference_url http://osvdb.org/34698
reference_id
reference_type
scores
url http://osvdb.org/34698
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2444.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2444.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-2444
reference_id
reference_type
scores
0
value 0.01258
scoring_system epss
scoring_elements 0.7943
published_at 2026-04-21T12:55:00Z
1
value 0.01258
scoring_system epss
scoring_elements 0.7935
published_at 2026-04-01T12:55:00Z
2
value 0.01258
scoring_system epss
scoring_elements 0.79357
published_at 2026-04-02T12:55:00Z
3
value 0.01258
scoring_system epss
scoring_elements 0.79379
published_at 2026-04-04T12:55:00Z
4
value 0.01258
scoring_system epss
scoring_elements 0.79365
published_at 2026-04-07T12:55:00Z
5
value 0.01258
scoring_system epss
scoring_elements 0.79392
published_at 2026-04-08T12:55:00Z
6
value 0.01258
scoring_system epss
scoring_elements 0.79401
published_at 2026-04-09T12:55:00Z
7
value 0.01258
scoring_system epss
scoring_elements 0.79424
published_at 2026-04-11T12:55:00Z
8
value 0.01258
scoring_system epss
scoring_elements 0.79409
published_at 2026-04-12T12:55:00Z
9
value 0.01258
scoring_system epss
scoring_elements 0.79397
published_at 2026-04-13T12:55:00Z
10
value 0.01258
scoring_system epss
scoring_elements 0.79429
published_at 2026-04-16T12:55:00Z
11
value 0.01258
scoring_system epss
scoring_elements 0.79427
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-2444
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2444
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2444
6
reference_url http://secunia.com/advisories/25232
reference_id
reference_type
scores
url http://secunia.com/advisories/25232
7
reference_url http://secunia.com/advisories/25241
reference_id
reference_type
scores
url http://secunia.com/advisories/25241
8
reference_url http://secunia.com/advisories/25246
reference_id
reference_type
scores
url http://secunia.com/advisories/25246
9
reference_url http://secunia.com/advisories/25251
reference_id
reference_type
scores
url http://secunia.com/advisories/25251
10
reference_url http://secunia.com/advisories/25255
reference_id
reference_type
scores
url http://secunia.com/advisories/25255
11
reference_url http://secunia.com/advisories/25256
reference_id
reference_type
scores
url http://secunia.com/advisories/25256
12
reference_url http://secunia.com/advisories/25259
reference_id
reference_type
scores
url http://secunia.com/advisories/25259
13
reference_url http://secunia.com/advisories/25270
reference_id
reference_type
scores
url http://secunia.com/advisories/25270
14
reference_url http://secunia.com/advisories/25289
reference_id
reference_type
scores
url http://secunia.com/advisories/25289
15
reference_url http://secunia.com/advisories/25675
reference_id
reference_type
scores
url http://secunia.com/advisories/25675
16
reference_url http://secunia.com/advisories/25772
reference_id
reference_type
scores
url http://secunia.com/advisories/25772
17
reference_url http://security.gentoo.org/glsa/glsa-200705-15.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200705-15.xml
18
reference_url http://securityreason.com/securityalert/2701
reference_id
reference_type
scores
url http://securityreason.com/securityalert/2701
19
reference_url https://issues.rpath.com/browse/RPL-1366
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1366
20
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.475906
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.475906
21
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102964-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102964-1
22
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-66-200588-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-66-200588-1
23
reference_url http://www.debian.org/security/2007/dsa-1291
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1291
24
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:104
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:104
25
reference_url http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html
reference_id
reference_type
scores
url http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html
26
reference_url http://www.samba.org/samba/security/CVE-2007-2444.html
reference_id
reference_type
scores
url http://www.samba.org/samba/security/CVE-2007-2444.html
27
reference_url http://www.securityfocus.com/archive/1/468548/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/468548/100/0/threaded
28
reference_url http://www.securityfocus.com/archive/1/468670/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/468670/100/0/threaded
29
reference_url http://www.securityfocus.com/bid/23974
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/23974
30
reference_url http://www.securitytracker.com/id?1018049
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1018049
31
reference_url http://www.trustix.org/errata/2007/0017/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0017/
32
reference_url http://www.ubuntu.com/usn/usn-460-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-460-1
33
reference_url http://www.ubuntu.com/usn/usn-460-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-460-2
34
reference_url http://www.vupen.com/english/advisories/2007/1805
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1805
35
reference_url http://www.vupen.com/english/advisories/2007/2210
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2210
36
reference_url http://www.vupen.com/english/advisories/2007/2281
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2281
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-2444
reference_id CVE-2007-2444
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2007-2444
46
reference_url https://security.gentoo.org/glsa/200705-15
reference_id GLSA-200705-15
reference_type
scores
url https://security.gentoo.org/glsa/200705-15
47
reference_url https://usn.ubuntu.com/460-1/
reference_id USN-460-1
reference_type
scores
url https://usn.ubuntu.com/460-1/
fixed_packages
0
url pkg:deb/debian/samba@3.0.25-1?distro=trixie
purl pkg:deb/debian/samba@3.0.25-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@3.0.25-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2007-2444
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5u1s-egmw-5ufq
35
url VCID-5vyg-1jzr-ebh8
vulnerability_id VCID-5vyg-1jzr-ebh8
summary Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25718.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25718.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-25718
reference_id
reference_type
scores
0
value 0.00198
scoring_system epss
scoring_elements 0.4183
published_at 2026-04-01T12:55:00Z
1
value 0.00198
scoring_system epss
scoring_elements 0.41743
published_at 2026-04-21T12:55:00Z
2
value 0.00198
scoring_system epss
scoring_elements 0.41793
published_at 2026-04-13T12:55:00Z
3
value 0.00198
scoring_system epss
scoring_elements 0.41842
published_at 2026-04-16T12:55:00Z
4
value 0.00198
scoring_system epss
scoring_elements 0.41895
published_at 2026-04-02T12:55:00Z
5
value 0.00198
scoring_system epss
scoring_elements 0.41923
published_at 2026-04-04T12:55:00Z
6
value 0.00198
scoring_system epss
scoring_elements 0.41755
published_at 2026-04-07T12:55:00Z
7
value 0.00198
scoring_system epss
scoring_elements 0.41805
published_at 2026-04-08T12:55:00Z
8
value 0.00198
scoring_system epss
scoring_elements 0.41815
published_at 2026-04-18T12:55:00Z
9
value 0.00198
scoring_system epss
scoring_elements 0.41838
published_at 2026-04-11T12:55:00Z
10
value 0.00198
scoring_system epss
scoring_elements 0.41806
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-25718
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2019726
reference_id 2019726
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2019726
12
reference_url https://security.archlinux.org/AVG-2538
reference_id AVG-2538
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2538
13
reference_url https://security.gentoo.org/glsa/202309-06
reference_id GLSA-202309-06
reference_type
scores
url https://security.gentoo.org/glsa/202309-06
14
reference_url https://usn.ubuntu.com/5142-1/
reference_id USN-5142-1
reference_type
scores
url https://usn.ubuntu.com/5142-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u2?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u2%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.13.14%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.13.14%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.14%252Bdfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
6
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2020-25718
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5vyg-1jzr-ebh8
36
url VCID-5x4z-u8e2-33bv
vulnerability_id VCID-5x4z-u8e2-33bv
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which may allow execution of arbitrary code with root privileges.
references
0
reference_url http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056229.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056229.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056241.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056241.html
3
reference_url http://marc.info/?l=bugtraq&m=130835366526620&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=130835366526620&w=2
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0719.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0719.json
5
reference_url http://samba.org/samba/security/CVE-2011-0719.html
reference_id
reference_type
scores
url http://samba.org/samba/security/CVE-2011-0719.html
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0719
reference_id
reference_type
scores
0
value 0.10347
scoring_system epss
scoring_elements 0.93218
published_at 2026-04-21T12:55:00Z
1
value 0.10347
scoring_system epss
scoring_elements 0.93161
published_at 2026-04-01T12:55:00Z
2
value 0.10347
scoring_system epss
scoring_elements 0.9317
published_at 2026-04-02T12:55:00Z
3
value 0.10347
scoring_system epss
scoring_elements 0.93174
published_at 2026-04-04T12:55:00Z
4
value 0.10347
scoring_system epss
scoring_elements 0.93173
published_at 2026-04-07T12:55:00Z
5
value 0.10347
scoring_system epss
scoring_elements 0.93181
published_at 2026-04-08T12:55:00Z
6
value 0.10347
scoring_system epss
scoring_elements 0.93186
published_at 2026-04-09T12:55:00Z
7
value 0.10347
scoring_system epss
scoring_elements 0.93191
published_at 2026-04-11T12:55:00Z
8
value 0.10347
scoring_system epss
scoring_elements 0.93188
published_at 2026-04-12T12:55:00Z
9
value 0.10347
scoring_system epss
scoring_elements 0.9319
published_at 2026-04-13T12:55:00Z
10
value 0.10347
scoring_system epss
scoring_elements 0.93206
published_at 2026-04-16T12:55:00Z
11
value 0.10347
scoring_system epss
scoring_elements 0.9321
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0719
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0719
8
reference_url http://secunia.com/advisories/43482
reference_id
reference_type
scores
url http://secunia.com/advisories/43482
9
reference_url http://secunia.com/advisories/43503
reference_id
reference_type
scores
url http://secunia.com/advisories/43503
10
reference_url http://secunia.com/advisories/43512
reference_id
reference_type
scores
url http://secunia.com/advisories/43512
11
reference_url http://secunia.com/advisories/43517
reference_id
reference_type
scores
url http://secunia.com/advisories/43517
12
reference_url http://secunia.com/advisories/43556
reference_id
reference_type
scores
url http://secunia.com/advisories/43556
13
reference_url http://secunia.com/advisories/43557
reference_id
reference_type
scores
url http://secunia.com/advisories/43557
14
reference_url http://secunia.com/advisories/43843
reference_id
reference_type
scores
url http://secunia.com/advisories/43843
15
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/65724
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/65724
16
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.593629
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.593629
17
reference_url http://support.apple.com/kb/HT4723
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4723
18
reference_url http://www.debian.org/security/2011/dsa-2175
reference_id
reference_type
scores
url http://www.debian.org/security/2011/dsa-2175
19
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:038
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:038
20
reference_url http://www.redhat.com/support/errata/RHSA-2011-0305.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0305.html
21
reference_url http://www.redhat.com/support/errata/RHSA-2011-0306.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0306.html
22
reference_url http://www.samba.org/samba/history/samba-3.3.15.html
reference_id
reference_type
scores
url http://www.samba.org/samba/history/samba-3.3.15.html
23
reference_url http://www.samba.org/samba/history/samba-3.4.12.html
reference_id
reference_type
scores
url http://www.samba.org/samba/history/samba-3.4.12.html
24
reference_url http://www.samba.org/samba/history/samba-3.5.7.html
reference_id
reference_type
scores
url http://www.samba.org/samba/history/samba-3.5.7.html
25
reference_url http://www.securityfocus.com/bid/46597
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/46597
26
reference_url http://www.securitytracker.com/id?1025132
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1025132
27
reference_url http://www.ubuntu.com/usn/USN-1075-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1075-1
28
reference_url http://www.vupen.com/english/advisories/2011/0517
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0517
29
reference_url http://www.vupen.com/english/advisories/2011/0518
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0518
30
reference_url http://www.vupen.com/english/advisories/2011/0519
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0519
31
reference_url http://www.vupen.com/english/advisories/2011/0520
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0520
32
reference_url http://www.vupen.com/english/advisories/2011/0522
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0522
33
reference_url http://www.vupen.com/english/advisories/2011/0541
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0541
34
reference_url http://www.vupen.com/english/advisories/2011/0702
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0702
35
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=678328
reference_id 678328
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=678328
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.1.0:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*
138
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*
139
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*
140
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*
141
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*
142
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*
143
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*
144
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*
145
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*
146
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*
147
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*
148
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*
149
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*
150
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*
151
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*
152
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*
153
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*
154
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*
155
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*
156
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*
157
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*
158
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*
159
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*
160
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*
161
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*
162
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*
163
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-0719
reference_id CVE-2011-0719
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2011-0719
164
reference_url https://security.gentoo.org/glsa/201206-22
reference_id GLSA-201206-22
reference_type
scores
url https://security.gentoo.org/glsa/201206-22
165
reference_url https://access.redhat.com/errata/RHSA-2011:0305
reference_id RHSA-2011:0305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0305
166
reference_url https://access.redhat.com/errata/RHSA-2011:0306
reference_id RHSA-2011:0306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0306
167
reference_url https://usn.ubuntu.com/1075-1/
reference_id USN-1075-1
reference_type
scores
url https://usn.ubuntu.com/1075-1/
fixed_packages
0
url pkg:deb/debian/samba@2:3.5.7~dfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:3.5.7~dfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:3.5.7~dfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2011-0719
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5x4z-u8e2-33bv
37
url VCID-61v1-61nn-hkb1
vulnerability_id VCID-61v1-61nn-hkb1
summary Multiple memory leaks in Samba before 3.0.6 allow attackers to cause a denial of service (memory consumption).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-2546.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-2546.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-2546
reference_id
reference_type
scores
0
value 0.00694
scoring_system epss
scoring_elements 0.7183
published_at 2026-04-01T12:55:00Z
1
value 0.00694
scoring_system epss
scoring_elements 0.71839
published_at 2026-04-02T12:55:00Z
2
value 0.00694
scoring_system epss
scoring_elements 0.71858
published_at 2026-04-04T12:55:00Z
3
value 0.00694
scoring_system epss
scoring_elements 0.71832
published_at 2026-04-07T12:55:00Z
4
value 0.00694
scoring_system epss
scoring_elements 0.7187
published_at 2026-04-13T12:55:00Z
5
value 0.00694
scoring_system epss
scoring_elements 0.71881
published_at 2026-04-09T12:55:00Z
6
value 0.00694
scoring_system epss
scoring_elements 0.71906
published_at 2026-04-11T12:55:00Z
7
value 0.00694
scoring_system epss
scoring_elements 0.71888
published_at 2026-04-12T12:55:00Z
8
value 0.00694
scoring_system epss
scoring_elements 0.71913
published_at 2026-04-16T12:55:00Z
9
value 0.00694
scoring_system epss
scoring_elements 0.71918
published_at 2026-04-18T12:55:00Z
10
value 0.00694
scoring_system epss
scoring_elements 0.71901
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-2546
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2546
fixed_packages
0
url pkg:deb/debian/samba@3.0.6-1?distro=trixie
purl pkg:deb/debian/samba@3.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@3.0.6-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2004-2546
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-61v1-61nn-hkb1
38
url VCID-65es-7qut-n7de
vulnerability_id VCID-65es-7qut-n7de
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0085.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0085.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2003-0085
reference_id
reference_type
scores
0
value 0.86073
scoring_system epss
scoring_elements 0.99397
published_at 2026-04-21T12:55:00Z
1
value 0.86073
scoring_system epss
scoring_elements 0.99389
published_at 2026-04-02T12:55:00Z
2
value 0.86073
scoring_system epss
scoring_elements 0.9939
published_at 2026-04-04T12:55:00Z
3
value 0.86073
scoring_system epss
scoring_elements 0.99392
published_at 2026-04-07T12:55:00Z
4
value 0.86073
scoring_system epss
scoring_elements 0.99393
published_at 2026-04-08T12:55:00Z
5
value 0.86073
scoring_system epss
scoring_elements 0.99394
published_at 2026-04-09T12:55:00Z
6
value 0.86073
scoring_system epss
scoring_elements 0.99395
published_at 2026-04-12T12:55:00Z
7
value 0.86073
scoring_system epss
scoring_elements 0.99396
published_at 2026-04-18T12:55:00Z
8
value 0.86073
scoring_system epss
scoring_elements 0.99398
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2003-0085
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0085
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0085
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 10
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1616963
reference_id 1616963
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1616963
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/16321.rb
reference_id CVE-2003-0085;OSVDB-6323
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/16321.rb
6
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/9936.rb
reference_id CVE-2003-0085;OSVDB-6323
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/9936.rb
7
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/remote/22356.c
reference_id CVE-2003-0085;OSVDB-6323
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/remote/22356.c
8
reference_url https://www.securityfocus.com/bid/7106/info
reference_id CVE-2003-0085;OSVDB-6323
reference_type exploit
scores
url https://www.securityfocus.com/bid/7106/info
9
reference_url https://access.redhat.com/errata/RHSA-2003:095
reference_id RHSA-2003:095
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:095
10
reference_url https://access.redhat.com/errata/RHSA-2003:096
reference_id RHSA-2003:096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:096
11
reference_url https://access.redhat.com/errata/RHSA-2003:226
reference_id RHSA-2003:226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:226
fixed_packages
0
url pkg:deb/debian/samba@2.2.8?distro=trixie
purl pkg:deb/debian/samba@2.2.8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2.2.8%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2003-0085
risk_score 10.0
exploitability 2.0
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-65es-7qut-n7de
39
url VCID-66cs-n3ad-efgy
vulnerability_id VCID-66cs-n3ad-efgy
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2123.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2123.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2123
reference_id
reference_type
scores
0
value 0.00863
scoring_system epss
scoring_elements 0.75036
published_at 2026-04-01T12:55:00Z
1
value 0.00863
scoring_system epss
scoring_elements 0.75115
published_at 2026-04-21T12:55:00Z
2
value 0.00863
scoring_system epss
scoring_elements 0.75118
published_at 2026-04-16T12:55:00Z
3
value 0.00863
scoring_system epss
scoring_elements 0.75125
published_at 2026-04-18T12:55:00Z
4
value 0.00863
scoring_system epss
scoring_elements 0.75038
published_at 2026-04-02T12:55:00Z
5
value 0.00863
scoring_system epss
scoring_elements 0.75067
published_at 2026-04-04T12:55:00Z
6
value 0.00863
scoring_system epss
scoring_elements 0.75044
published_at 2026-04-07T12:55:00Z
7
value 0.00863
scoring_system epss
scoring_elements 0.75078
published_at 2026-04-08T12:55:00Z
8
value 0.00863
scoring_system epss
scoring_elements 0.75089
published_at 2026-04-09T12:55:00Z
9
value 0.00863
scoring_system epss
scoring_elements 0.75112
published_at 2026-04-11T12:55:00Z
10
value 0.00863
scoring_system epss
scoring_elements 0.7509
published_at 2026-04-12T12:55:00Z
11
value 0.00863
scoring_system epss
scoring_elements 0.7508
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2123
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2119
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2119
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2123
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2125
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2126
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2126
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.9
scoring_system cvssv2
scoring_elements AV:A/AC:M/Au:N/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1392702
reference_id 1392702
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1392702
8
reference_url https://security.archlinux.org/ASA-201612-19
reference_id ASA-201612-19
reference_type
scores
url https://security.archlinux.org/ASA-201612-19
9
reference_url https://security.archlinux.org/AVG-111
reference_id AVG-111
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-111
10
reference_url https://usn.ubuntu.com/3158-1/
reference_id USN-3158-1
reference_type
scores
url https://usn.ubuntu.com/3158-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.5.2%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.5.2%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.5.2%252Bdfsg-2%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2016-2123
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-66cs-n3ad-efgy
40
url VCID-68zz-z589-87f6
vulnerability_id VCID-68zz-z589-87f6
summary samba: Command Injection in WINS Server Hook Script
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-10230.json
reference_id
reference_type
scores
0
value 10.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-10230.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-10230
reference_id
reference_type
scores
0
value 0.00267
scoring_system epss
scoring_elements 0.50186
published_at 2026-04-07T12:55:00Z
1
value 0.00267
scoring_system epss
scoring_elements 0.50234
published_at 2026-04-12T12:55:00Z
2
value 0.00267
scoring_system epss
scoring_elements 0.5026
published_at 2026-04-11T12:55:00Z
3
value 0.00267
scoring_system epss
scoring_elements 0.50232
published_at 2026-04-09T12:55:00Z
4
value 0.00267
scoring_system epss
scoring_elements 0.50222
published_at 2026-04-13T12:55:00Z
5
value 0.00267
scoring_system epss
scoring_elements 0.50239
published_at 2026-04-08T12:55:00Z
6
value 0.00267
scoring_system epss
scoring_elements 0.50267
published_at 2026-04-16T12:55:00Z
7
value 0.00278
scoring_system epss
scoring_elements 0.51223
published_at 2026-04-04T12:55:00Z
8
value 0.00278
scoring_system epss
scoring_elements 0.51198
published_at 2026-04-02T12:55:00Z
9
value 0.00378
scoring_system epss
scoring_elements 0.59395
published_at 2026-04-18T12:55:00Z
10
value 0.00378
scoring_system epss
scoring_elements 0.59376
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-10230
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10230
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2394377
reference_id 2394377
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-11-08T04:55:22Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2394377
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
11
reference_url https://access.redhat.com/security/cve/CVE-2025-10230
reference_id CVE-2025-10230
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-11-08T04:55:22Z/
url https://access.redhat.com/security/cve/CVE-2025-10230
12
reference_url https://www.samba.org/samba/history/security.html
reference_id security.html
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-11-08T04:55:22Z/
url https://www.samba.org/samba/history/security.html
13
reference_url https://usn.ubuntu.com/7826-1/
reference_id USN-7826-1
reference_type
scores
url https://usn.ubuntu.com/7826-1/
14
reference_url https://usn.ubuntu.com/7826-2/
reference_id USN-7826-2
reference_type
scores
url https://usn.ubuntu.com/7826-2/
fixed_packages
0
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.22.6%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.6%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.6%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.23.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.23.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.2%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2025-10230
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-68zz-z589-87f6
41
url VCID-6are-8jqa-nqae
vulnerability_id VCID-6are-8jqa-nqae
summary samba: NULL pointer dereference in Samba LDAP server leading to crash and Dos
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12436.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12436.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-12436
reference_id
reference_type
scores
0
value 0.02439
scoring_system epss
scoring_elements 0.85195
published_at 2026-04-21T12:55:00Z
1
value 0.02439
scoring_system epss
scoring_elements 0.85176
published_at 2026-04-12T12:55:00Z
2
value 0.02439
scoring_system epss
scoring_elements 0.85173
published_at 2026-04-13T12:55:00Z
3
value 0.02439
scoring_system epss
scoring_elements 0.85194
published_at 2026-04-16T12:55:00Z
4
value 0.02439
scoring_system epss
scoring_elements 0.85131
published_at 2026-04-04T12:55:00Z
5
value 0.02439
scoring_system epss
scoring_elements 0.85134
published_at 2026-04-07T12:55:00Z
6
value 0.02439
scoring_system epss
scoring_elements 0.85157
published_at 2026-04-08T12:55:00Z
7
value 0.02439
scoring_system epss
scoring_elements 0.85164
published_at 2026-04-09T12:55:00Z
8
value 0.02439
scoring_system epss
scoring_elements 0.85179
published_at 2026-04-11T12:55:00Z
9
value 0.04233
scoring_system epss
scoring_elements 0.88732
published_at 2026-04-02T12:55:00Z
10
value 0.04233
scoring_system epss
scoring_elements 0.88723
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-12436
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1711837
reference_id 1711837
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1711837
4
reference_url https://usn.ubuntu.com/4018-1/
reference_id USN-4018-1
reference_type
scores
url https://usn.ubuntu.com/4018-1/
fixed_packages
0
url pkg:deb/debian/samba@0?distro=trixie
purl pkg:deb/debian/samba@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@0%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2019-12436
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6are-8jqa-nqae
42
url VCID-6mju-nwzy-pqeq
vulnerability_id VCID-6mju-nwzy-pqeq
summary Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32743.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32743.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32743
reference_id
reference_type
scores
0
value 0.01153
scoring_system epss
scoring_elements 0.78461
published_at 2026-04-02T12:55:00Z
1
value 0.01153
scoring_system epss
scoring_elements 0.78492
published_at 2026-04-04T12:55:00Z
2
value 0.01153
scoring_system epss
scoring_elements 0.78475
published_at 2026-04-07T12:55:00Z
3
value 0.01153
scoring_system epss
scoring_elements 0.78502
published_at 2026-04-08T12:55:00Z
4
value 0.01153
scoring_system epss
scoring_elements 0.78507
published_at 2026-04-09T12:55:00Z
5
value 0.01153
scoring_system epss
scoring_elements 0.78532
published_at 2026-04-11T12:55:00Z
6
value 0.01153
scoring_system epss
scoring_elements 0.78514
published_at 2026-04-12T12:55:00Z
7
value 0.01153
scoring_system epss
scoring_elements 0.78506
published_at 2026-04-13T12:55:00Z
8
value 0.01153
scoring_system epss
scoring_elements 0.78534
published_at 2026-04-16T12:55:00Z
9
value 0.01153
scoring_system epss
scoring_elements 0.78533
published_at 2026-04-18T12:55:00Z
10
value 0.01153
scoring_system epss
scoring_elements 0.78531
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32743
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32743
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021022
reference_id 1021022
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021022
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2121128
reference_id 2121128
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2121128
6
reference_url https://security.gentoo.org/glsa/202309-06
reference_id GLSA-202309-06
reference_type
scores
url https://security.gentoo.org/glsa/202309-06
fixed_packages
0
url pkg:deb/debian/samba@2:4.17.2%2Bdfsg-3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.2%2Bdfsg-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.2%252Bdfsg-3%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2022-32743
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6mju-nwzy-pqeq
43
url VCID-745n-wca7-d7fh
vulnerability_id VCID-745n-wca7-d7fh
summary samba: vfs_streams_xattr uninitialized memory write possible
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-9640.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-9640.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-9640
reference_id
reference_type
scores
0
value 0.00077
scoring_system epss
scoring_elements 0.22922
published_at 2026-04-21T12:55:00Z
1
value 0.00077
scoring_system epss
scoring_elements 0.23062
published_at 2026-04-02T12:55:00Z
2
value 0.00077
scoring_system epss
scoring_elements 0.23042
published_at 2026-04-11T12:55:00Z
3
value 0.00077
scoring_system epss
scoring_elements 0.23004
published_at 2026-04-12T12:55:00Z
4
value 0.00077
scoring_system epss
scoring_elements 0.22949
published_at 2026-04-13T12:55:00Z
5
value 0.00077
scoring_system epss
scoring_elements 0.22965
published_at 2026-04-16T12:55:00Z
6
value 0.00077
scoring_system epss
scoring_elements 0.22958
published_at 2026-04-18T12:55:00Z
7
value 0.00077
scoring_system epss
scoring_elements 0.23106
published_at 2026-04-04T12:55:00Z
8
value 0.00077
scoring_system epss
scoring_elements 0.22898
published_at 2026-04-07T12:55:00Z
9
value 0.00077
scoring_system epss
scoring_elements 0.2297
published_at 2026-04-08T12:55:00Z
10
value 0.00077
scoring_system epss
scoring_elements 0.23023
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-9640
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9640
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2391698
reference_id 2391698
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-15T13:06:54Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2391698
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
11
reference_url https://access.redhat.com/security/cve/CVE-2025-9640
reference_id CVE-2025-9640
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-15T13:06:54Z/
url https://access.redhat.com/security/cve/CVE-2025-9640
12
reference_url https://www.samba.org/samba/history/security.html
reference_id security.html
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-15T13:06:54Z/
url https://www.samba.org/samba/history/security.html
13
reference_url https://usn.ubuntu.com/7826-1/
reference_id USN-7826-1
reference_type
scores
url https://usn.ubuntu.com/7826-1/
14
reference_url https://usn.ubuntu.com/7826-2/
reference_id USN-7826-2
reference_type
scores
url https://usn.ubuntu.com/7826-2/
fixed_packages
0
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u7?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u7%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.6%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.6%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.6%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.23.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.23.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.2%252Bdfsg-1%3Fdistro=trixie
6
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
7
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2025-9640
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-745n-wca7-d7fh
44
url VCID-76sz-d2yt-buek
vulnerability_id VCID-76sz-d2yt-buek
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14383.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14383.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14383
reference_id
reference_type
scores
0
value 0.00465
scoring_system epss
scoring_elements 0.64258
published_at 2026-04-01T12:55:00Z
1
value 0.00465
scoring_system epss
scoring_elements 0.64316
published_at 2026-04-02T12:55:00Z
2
value 0.00465
scoring_system epss
scoring_elements 0.64375
published_at 2026-04-21T12:55:00Z
3
value 0.00465
scoring_system epss
scoring_elements 0.64377
published_at 2026-04-11T12:55:00Z
4
value 0.00465
scoring_system epss
scoring_elements 0.64365
published_at 2026-04-12T12:55:00Z
5
value 0.00465
scoring_system epss
scoring_elements 0.64336
published_at 2026-04-13T12:55:00Z
6
value 0.00465
scoring_system epss
scoring_elements 0.64372
published_at 2026-04-16T12:55:00Z
7
value 0.00465
scoring_system epss
scoring_elements 0.64383
published_at 2026-04-18T12:55:00Z
8
value 0.00465
scoring_system epss
scoring_elements 0.64344
published_at 2026-04-04T12:55:00Z
9
value 0.00465
scoring_system epss
scoring_elements 0.64301
published_at 2026-04-07T12:55:00Z
10
value 0.00465
scoring_system epss
scoring_elements 0.64349
published_at 2026-04-08T12:55:00Z
11
value 0.00465
scoring_system epss
scoring_elements 0.64364
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14383
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14383
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14383
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1892636
reference_id 1892636
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T15:10:17Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=1892636
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973398
reference_id 973398
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973398
6
reference_url https://www.samba.org/samba/security/CVE-2020-14383.html
reference_id CVE-2020-14383.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T15:10:17Z/
url https://www.samba.org/samba/security/CVE-2020-14383.html
7
reference_url https://security.gentoo.org/glsa/202012-24
reference_id GLSA-202012-24
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T15:10:17Z/
url https://security.gentoo.org/glsa/202012-24
8
reference_url https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html
reference_id msg00015.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T15:10:17Z/
url https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html
9
reference_url https://usn.ubuntu.com/4611-1/
reference_id USN-4611-1
reference_type
scores
url https://usn.ubuntu.com/4611-1/
10
reference_url https://usn.ubuntu.com/4931-1/
reference_id USN-4931-1
reference_type
scores
url https://usn.ubuntu.com/4931-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.13.2%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.13.2%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.2%252Bdfsg-2%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2020-14383
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-76sz-d2yt-buek
45
url VCID-79ey-6e1v-2fb8
vulnerability_id VCID-79ey-6e1v-2fb8
summary security flaw
references
0
reference_url ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.17/SCOSA-2005.17.txt
reference_id
reference_type
scores
url ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.17/SCOSA-2005.17.txt
1
reference_url ftp://patches.sgi.com/support/free/security/advisories/20041201-01-P
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20041201-01-P
2
reference_url http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000899
reference_id
reference_type
scores
url http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000899
3
reference_url http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html
4
reference_url http://marc.info/?l=bugtraq&m=110054671403755&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=110054671403755&w=2
5
reference_url http://marc.info/?l=bugtraq&m=110055646329581&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=110055646329581&w=2
6
reference_url http://marc.info/?l=bugtraq&m=110330519803655&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=110330519803655&w=2
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0882.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0882.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0882
reference_id
reference_type
scores
0
value 0.46754
scoring_system epss
scoring_elements 0.97674
published_at 2026-04-21T12:55:00Z
1
value 0.46754
scoring_system epss
scoring_elements 0.97644
published_at 2026-04-01T12:55:00Z
2
value 0.46754
scoring_system epss
scoring_elements 0.9765
published_at 2026-04-02T12:55:00Z
3
value 0.46754
scoring_system epss
scoring_elements 0.97652
published_at 2026-04-04T12:55:00Z
4
value 0.46754
scoring_system epss
scoring_elements 0.97653
published_at 2026-04-07T12:55:00Z
5
value 0.46754
scoring_system epss
scoring_elements 0.97658
published_at 2026-04-08T12:55:00Z
6
value 0.46754
scoring_system epss
scoring_elements 0.9766
published_at 2026-04-09T12:55:00Z
7
value 0.46754
scoring_system epss
scoring_elements 0.97662
published_at 2026-04-11T12:55:00Z
8
value 0.46754
scoring_system epss
scoring_elements 0.97664
published_at 2026-04-12T12:55:00Z
9
value 0.46754
scoring_system epss
scoring_elements 0.97665
published_at 2026-04-13T12:55:00Z
10
value 0.46754
scoring_system epss
scoring_elements 0.97672
published_at 2026-04-16T12:55:00Z
11
value 0.46754
scoring_system epss
scoring_elements 0.97675
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0882
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0882
10
reference_url http://secunia.com/advisories/13189
reference_id
reference_type
scores
url http://secunia.com/advisories/13189
11
reference_url http://security.e-matters.de/advisories/132004.html
reference_id
reference_type
scores
url http://security.e-matters.de/advisories/132004.html
12
reference_url http://securitytracker.com/id?1012235
reference_id
reference_type
scores
url http://securitytracker.com/id?1012235
13
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/18070
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/18070
14
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9969
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9969
15
reference_url http://www.ciac.org/ciac/bulletins/p-038.shtml
reference_id
reference_type
scores
url http://www.ciac.org/ciac/bulletins/p-038.shtml
16
reference_url http://www.kb.cert.org/vuls/id/457622
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/457622
17
reference_url http://www.novell.com/linux/security/advisories/2004_40_samba.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2004_40_samba.html
18
reference_url http://www.osvdb.org/11782
reference_id
reference_type
scores
url http://www.osvdb.org/11782
19
reference_url http://www.trustix.net/errata/2004/0058/
reference_id
reference_type
scores
url http://www.trustix.net/errata/2004/0058/
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617311
reference_id 1617311
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617311
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*
reference_id cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2004-0882
reference_id CVE-2004-0882
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2004-0882
49
reference_url https://access.redhat.com/errata/RHSA-2004:632
reference_id RHSA-2004:632
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:632
50
reference_url https://usn.ubuntu.com/29-1/
reference_id USN-29-1
reference_type
scores
url https://usn.ubuntu.com/29-1/
fixed_packages
0
url pkg:deb/debian/samba@3.0.7?distro=trixie
purl pkg:deb/debian/samba@3.0.7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@3.0.7%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2004-0882
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-79ey-6e1v-2fb8
46
url VCID-7bb1-3ny6-rbbv
vulnerability_id VCID-7bb1-3ny6-rbbv
summary Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44142.json
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44142.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-44142
reference_id
reference_type
scores
0
value 0.30651
scoring_system epss
scoring_elements 0.96699
published_at 2026-04-04T12:55:00Z
1
value 0.30651
scoring_system epss
scoring_elements 0.96687
published_at 2026-04-01T12:55:00Z
2
value 0.30651
scoring_system epss
scoring_elements 0.96697
published_at 2026-04-02T12:55:00Z
3
value 0.32269
scoring_system epss
scoring_elements 0.96831
published_at 2026-04-08T12:55:00Z
4
value 0.32269
scoring_system epss
scoring_elements 0.96823
published_at 2026-04-07T12:55:00Z
5
value 0.37405
scoring_system epss
scoring_elements 0.97195
published_at 2026-04-21T12:55:00Z
6
value 0.37405
scoring_system epss
scoring_elements 0.97175
published_at 2026-04-09T12:55:00Z
7
value 0.37405
scoring_system epss
scoring_elements 0.97179
published_at 2026-04-11T12:55:00Z
8
value 0.37405
scoring_system epss
scoring_elements 0.9718
published_at 2026-04-12T12:55:00Z
9
value 0.37405
scoring_system epss
scoring_elements 0.97181
published_at 2026-04-13T12:55:00Z
10
value 0.37405
scoring_system epss
scoring_elements 0.97188
published_at 2026-04-16T12:55:00Z
11
value 0.37405
scoring_system epss
scoring_elements 0.97191
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-44142
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44142
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44142
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004693
reference_id 1004693
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004693
5
reference_url https://kb.cert.org/vuls/id/119678
reference_id 119678
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:30:59Z/
url https://kb.cert.org/vuls/id/119678
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2046146
reference_id 2046146
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2046146
7
reference_url https://security.archlinux.org/AVG-2648
reference_id AVG-2648
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2648
8
reference_url https://www.zerodayinitiative.com/blog/2022/2/1/cve-2021-44142-details-on-a-samba-code-execution-bug-demonstrated-at-pwn2own-austin
reference_id cve-2021-44142-details-on-a-samba-code-execution-bug-demonstrated-at-pwn2own-austin
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:30:59Z/
url https://www.zerodayinitiative.com/blog/2022/2/1/cve-2021-44142-details-on-a-samba-code-execution-bug-demonstrated-at-pwn2own-austin
9
reference_url https://www.samba.org/samba/security/CVE-2021-44142.html
reference_id CVE-2021-44142.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:30:59Z/
url https://www.samba.org/samba/security/CVE-2021-44142.html
10
reference_url https://security.gentoo.org/glsa/202309-06
reference_id GLSA-202309-06
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:30:59Z/
url https://security.gentoo.org/glsa/202309-06
11
reference_url https://access.redhat.com/errata/RHSA-2022:0328
reference_id RHSA-2022:0328
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0328
12
reference_url https://access.redhat.com/errata/RHSA-2022:0329
reference_id RHSA-2022:0329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0329
13
reference_url https://access.redhat.com/errata/RHSA-2022:0330
reference_id RHSA-2022:0330
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0330
14
reference_url https://access.redhat.com/errata/RHSA-2022:0331
reference_id RHSA-2022:0331
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0331
15
reference_url https://access.redhat.com/errata/RHSA-2022:0332
reference_id RHSA-2022:0332
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0332
16
reference_url https://access.redhat.com/errata/RHSA-2022:0457
reference_id RHSA-2022:0457
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0457
17
reference_url https://access.redhat.com/errata/RHSA-2022:0458
reference_id RHSA-2022:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0458
18
reference_url https://access.redhat.com/errata/RHSA-2022:0663
reference_id RHSA-2022:0663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0663
19
reference_url https://access.redhat.com/errata/RHSA-2022:0664
reference_id RHSA-2022:0664
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0664
20
reference_url https://bugzilla.samba.org/show_bug.cgi?id=14914
reference_id show_bug.cgi?id=14914
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:30:59Z/
url https://bugzilla.samba.org/show_bug.cgi?id=14914
21
reference_url https://usn.ubuntu.com/5260-1/
reference_id USN-5260-1
reference_type
scores
url https://usn.ubuntu.com/5260-1/
22
reference_url https://usn.ubuntu.com/5260-2/
reference_id USN-5260-2
reference_type
scores
url https://usn.ubuntu.com/5260-2/
23
reference_url https://usn.ubuntu.com/5260-3/
reference_id USN-5260-3
reference_type
scores
url https://usn.ubuntu.com/5260-3/
fixed_packages
0
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u3?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u3%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.16.0%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.16.0%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.16.0%252Bdfsg-2%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
6
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2021-44142
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7bb1-3ny6-rbbv
47
url VCID-7qr6-s8zs-7ygf
vulnerability_id VCID-7qr6-s8zs-7ygf
summary samba: SMB2 connections don't keep encryption across DFS redirects (incomplete fix of CVE-2017-12151)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15086.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15086.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15086
reference_id
reference_type
scores
0
value 0.00256
scoring_system epss
scoring_elements 0.48956
published_at 2026-04-01T12:55:00Z
1
value 0.00256
scoring_system epss
scoring_elements 0.49028
published_at 2026-04-21T12:55:00Z
2
value 0.00256
scoring_system epss
scoring_elements 0.49064
published_at 2026-04-16T12:55:00Z
3
value 0.00256
scoring_system epss
scoring_elements 0.4906
published_at 2026-04-18T12:55:00Z
4
value 0.00256
scoring_system epss
scoring_elements 0.48992
published_at 2026-04-02T12:55:00Z
5
value 0.00256
scoring_system epss
scoring_elements 0.49019
published_at 2026-04-13T12:55:00Z
6
value 0.00256
scoring_system epss
scoring_elements 0.48973
published_at 2026-04-07T12:55:00Z
7
value 0.00256
scoring_system epss
scoring_elements 0.49027
published_at 2026-04-08T12:55:00Z
8
value 0.00256
scoring_system epss
scoring_elements 0.49023
published_at 2026-04-09T12:55:00Z
9
value 0.00256
scoring_system epss
scoring_elements 0.4904
published_at 2026-04-11T12:55:00Z
10
value 0.00256
scoring_system epss
scoring_elements 0.49013
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15086
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15086
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15086
3
reference_url http://www.securityfocus.com/bid/101555
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101555
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1505785
reference_id 1505785
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1505785
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:gluster_storage:3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:gluster_storage:3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:gluster_storage:3.3:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15086
reference_id CVE-2017-15086
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
1
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-15086
8
reference_url https://access.redhat.com/errata/RHSA-2017:3110
reference_id RHSA-2017:3110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3110
fixed_packages
0
url pkg:deb/debian/samba@0?distro=trixie
purl pkg:deb/debian/samba@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@0%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2017-15086
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7qr6-s8zs-7ygf
48
url VCID-7r2h-141r-rfb1
vulnerability_id VCID-7r2h-141r-rfb1
summary samba: Group mapping information LDB file created with insecure permissions
references
0
reference_url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496073
reference_id
reference_type
scores
url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496073
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3789.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3789.json
2
reference_url http://samba.org/samba/security/CVE-2008-3789.html
reference_id
reference_type
scores
url http://samba.org/samba/security/CVE-2008-3789.html
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-3789
reference_id
reference_type
scores
0
value 0.01268
scoring_system epss
scoring_elements 0.79504
published_at 2026-04-21T12:55:00Z
1
value 0.01268
scoring_system epss
scoring_elements 0.79421
published_at 2026-04-01T12:55:00Z
2
value 0.01268
scoring_system epss
scoring_elements 0.79428
published_at 2026-04-02T12:55:00Z
3
value 0.01268
scoring_system epss
scoring_elements 0.79451
published_at 2026-04-04T12:55:00Z
4
value 0.01268
scoring_system epss
scoring_elements 0.79438
published_at 2026-04-07T12:55:00Z
5
value 0.01268
scoring_system epss
scoring_elements 0.79466
published_at 2026-04-08T12:55:00Z
6
value 0.01268
scoring_system epss
scoring_elements 0.79476
published_at 2026-04-09T12:55:00Z
7
value 0.01268
scoring_system epss
scoring_elements 0.79498
published_at 2026-04-11T12:55:00Z
8
value 0.01268
scoring_system epss
scoring_elements 0.79481
published_at 2026-04-12T12:55:00Z
9
value 0.01268
scoring_system epss
scoring_elements 0.79471
published_at 2026-04-13T12:55:00Z
10
value 0.01268
scoring_system epss
scoring_elements 0.79502
published_at 2026-04-16T12:55:00Z
11
value 0.01268
scoring_system epss
scoring_elements 0.79499
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-3789
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3789
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3789
5
reference_url http://secunia.com/advisories/31601
reference_id
reference_type
scores
url http://secunia.com/advisories/31601
6
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/44678
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/44678
7
reference_url http://www.openwall.com/lists/oss-security/2008/08/26/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/08/26/2
8
reference_url http://www.securityfocus.com/bid/30837
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/30837
9
reference_url http://www.securitytracker.com/id?1020770
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020770
10
reference_url http://www.vupen.com/english/advisories/2008/2440
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2440
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=460150
reference_id 460150
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=460150
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496073
reference_id 496073
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496073
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-3789
reference_id CVE-2008-3789
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2008-3789
fixed_packages
0
url pkg:deb/debian/samba@2:3.2.3-1?distro=trixie
purl pkg:deb/debian/samba@2:3.2.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:3.2.3-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2008-3789
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7r2h-141r-rfb1
49
url VCID-7rcm-14da-ybdv
vulnerability_id VCID-7rcm-14da-ybdv
summary Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3592.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3592.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3592
reference_id
reference_type
scores
0
value 0.00635
scoring_system epss
scoring_elements 0.70424
published_at 2026-04-21T12:55:00Z
1
value 0.00635
scoring_system epss
scoring_elements 0.70338
published_at 2026-04-07T12:55:00Z
2
value 0.00635
scoring_system epss
scoring_elements 0.70384
published_at 2026-04-08T12:55:00Z
3
value 0.00635
scoring_system epss
scoring_elements 0.70398
published_at 2026-04-09T12:55:00Z
4
value 0.00635
scoring_system epss
scoring_elements 0.70422
published_at 2026-04-11T12:55:00Z
5
value 0.00635
scoring_system epss
scoring_elements 0.70407
published_at 2026-04-12T12:55:00Z
6
value 0.00635
scoring_system epss
scoring_elements 0.70393
published_at 2026-04-13T12:55:00Z
7
value 0.00635
scoring_system epss
scoring_elements 0.70435
published_at 2026-04-16T12:55:00Z
8
value 0.00635
scoring_system epss
scoring_elements 0.70444
published_at 2026-04-18T12:55:00Z
9
value 0.00635
scoring_system epss
scoring_elements 0.7036
published_at 2026-04-04T12:55:00Z
10
value 0.00828
scoring_system epss
scoring_elements 0.74463
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3592
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2137776
reference_id 2137776
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T15:14:01Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2137776
4
reference_url https://access.redhat.com/security/cve/CVE-2022-3592
reference_id CVE-2022-3592
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T15:14:01Z/
url https://access.redhat.com/security/cve/CVE-2022-3592
5
reference_url https://www.samba.org/samba/security/CVE-2022-3592.html
reference_id CVE-2022-3592.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T15:14:01Z/
url https://www.samba.org/samba/security/CVE-2022-3592.html
6
reference_url https://security.gentoo.org/glsa/202309-06
reference_id GLSA-202309-06
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T15:14:01Z/
url https://security.gentoo.org/glsa/202309-06
fixed_packages
0
url pkg:deb/debian/samba@0?distro=trixie
purl pkg:deb/debian/samba@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@0%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2022-3592
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7rcm-14da-ybdv
50
url VCID-7vdb-ve2b-c7b4
vulnerability_id VCID-7vdb-ve2b-c7b4
summary Samba before 2.2.5 does not properly terminate the enum_csc_policy data structure, which may allow remote attackers to execute arbitrary code via a buffer overflow attack.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-2196.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-2196.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2002-2196
reference_id
reference_type
scores
0
value 0.13066
scoring_system epss
scoring_elements 0.94057
published_at 2026-04-01T12:55:00Z
1
value 0.13066
scoring_system epss
scoring_elements 0.94067
published_at 2026-04-02T12:55:00Z
2
value 0.13066
scoring_system epss
scoring_elements 0.94077
published_at 2026-04-04T12:55:00Z
3
value 0.13066
scoring_system epss
scoring_elements 0.9408
published_at 2026-04-07T12:55:00Z
4
value 0.13066
scoring_system epss
scoring_elements 0.94089
published_at 2026-04-08T12:55:00Z
5
value 0.13066
scoring_system epss
scoring_elements 0.94093
published_at 2026-04-09T12:55:00Z
6
value 0.13066
scoring_system epss
scoring_elements 0.94098
published_at 2026-04-13T12:55:00Z
7
value 0.13066
scoring_system epss
scoring_elements 0.94114
published_at 2026-04-16T12:55:00Z
8
value 0.13066
scoring_system epss
scoring_elements 0.94118
published_at 2026-04-18T12:55:00Z
9
value 0.13066
scoring_system epss
scoring_elements 0.94119
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2002-2196
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2196
fixed_packages
0
url pkg:deb/debian/samba@2.2.5?distro=trixie
purl pkg:deb/debian/samba@2.2.5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2.2.5%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2002-2196
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7vdb-ve2b-c7b4
51
url VCID-7xaa-6397-eyby
vulnerability_id VCID-7xaa-6397-eyby
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which may allow execution of arbitrary code with root privileges.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174076.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174076.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174391.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174391.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3223.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3223.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3223
reference_id
reference_type
scores
0
value 0.20255
scoring_system epss
scoring_elements 0.95527
published_at 2026-04-21T12:55:00Z
1
value 0.20255
scoring_system epss
scoring_elements 0.9552
published_at 2026-04-16T12:55:00Z
2
value 0.20255
scoring_system epss
scoring_elements 0.95525
published_at 2026-04-18T12:55:00Z
3
value 0.20255
scoring_system epss
scoring_elements 0.95475
published_at 2026-04-01T12:55:00Z
4
value 0.20255
scoring_system epss
scoring_elements 0.95485
published_at 2026-04-02T12:55:00Z
5
value 0.20255
scoring_system epss
scoring_elements 0.95491
published_at 2026-04-04T12:55:00Z
6
value 0.20255
scoring_system epss
scoring_elements 0.95496
published_at 2026-04-07T12:55:00Z
7
value 0.20255
scoring_system epss
scoring_elements 0.95502
published_at 2026-04-08T12:55:00Z
8
value 0.20255
scoring_system epss
scoring_elements 0.95505
published_at 2026-04-09T12:55:00Z
9
value 0.20255
scoring_system epss
scoring_elements 0.95509
published_at 2026-04-11T12:55:00Z
10
value 0.20255
scoring_system epss
scoring_elements 0.95511
published_at 2026-04-12T12:55:00Z
11
value 0.20255
scoring_system epss
scoring_elements 0.95512
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3223
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3223
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3223
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5252
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5252
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5296
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5299
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5330
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5330
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7540
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7540
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8467
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8467
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=aa6c27148b9d3f8c1e4fdd5dd46bfecbbd0ca465
reference_id
reference_type
scores
url https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=aa6c27148b9d3f8c1e4fdd5dd46bfecbbd0ca465
18
reference_url https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=ec504dbf69636a554add1f3d5703dd6c3ad450b8
reference_id
reference_type
scores
url https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=ec504dbf69636a554add1f3d5703dd6c3ad450b8
19
reference_url https://www.samba.org/samba/security/CVE-2015-3223.html
reference_id
reference_type
scores
url https://www.samba.org/samba/security/CVE-2015-3223.html
20
reference_url http://www.debian.org/security/2016/dsa-3433
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3433
21
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
22
reference_url http://www.securityfocus.com/bid/79731
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79731
23
reference_url http://www.securitytracker.com/id/1034493
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034493
24
reference_url http://www.ubuntu.com/usn/USN-2855-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2855-1
25
reference_url http://www.ubuntu.com/usn/USN-2855-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2855-2
26
reference_url http://www.ubuntu.com/usn/USN-2856-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2856-1
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1290287
reference_id 1290287
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1290287
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-3223
reference_id CVE-2015-3223
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2015-3223
86
reference_url https://security.gentoo.org/glsa/201612-47
reference_id GLSA-201612-47
reference_type
scores
url https://security.gentoo.org/glsa/201612-47
87
reference_url https://access.redhat.com/errata/RHSA-2016:0009
reference_id RHSA-2016:0009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0009
88
reference_url https://access.redhat.com/errata/RHSA-2016:0014
reference_id RHSA-2016:0014
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0014
89
reference_url https://usn.ubuntu.com/2855-1/
reference_id USN-2855-1
reference_type
scores
url https://usn.ubuntu.com/2855-1/
90
reference_url https://usn.ubuntu.com/2856-1/
reference_id USN-2856-1
reference_type
scores
url https://usn.ubuntu.com/2856-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.1.22%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.1.22%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.1.22%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2015-3223
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7xaa-6397-eyby
52
url VCID-7xdg-sn88-bkbs
vulnerability_id VCID-7xdg-sn88-bkbs
summary Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45141.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45141.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-45141
reference_id
reference_type
scores
0
value 0.0067
scoring_system epss
scoring_elements 0.71361
published_at 2026-04-21T12:55:00Z
1
value 0.0067
scoring_system epss
scoring_elements 0.71337
published_at 2026-04-09T12:55:00Z
2
value 0.0067
scoring_system epss
scoring_elements 0.7136
published_at 2026-04-11T12:55:00Z
3
value 0.0067
scoring_system epss
scoring_elements 0.71345
published_at 2026-04-12T12:55:00Z
4
value 0.0067
scoring_system epss
scoring_elements 0.71328
published_at 2026-04-13T12:55:00Z
5
value 0.0067
scoring_system epss
scoring_elements 0.71374
published_at 2026-04-16T12:55:00Z
6
value 0.0067
scoring_system epss
scoring_elements 0.71381
published_at 2026-04-18T12:55:00Z
7
value 0.0067
scoring_system epss
scoring_elements 0.7129
published_at 2026-04-02T12:55:00Z
8
value 0.0067
scoring_system epss
scoring_elements 0.71308
published_at 2026-04-04T12:55:00Z
9
value 0.0067
scoring_system epss
scoring_elements 0.71282
published_at 2026-04-07T12:55:00Z
10
value 0.0067
scoring_system epss
scoring_elements 0.71324
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-45141
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45141
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45141
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2154376
reference_id 2154376
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2154376
5
reference_url https://security.archlinux.org/AVG-2828
reference_id AVG-2828
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2828
6
reference_url https://www.samba.org/samba/security/CVE-2022-45141.html
reference_id CVE-2022-45141.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-03-06T20:38:03Z/
url https://www.samba.org/samba/security/CVE-2022-45141.html
7
reference_url https://security.gentoo.org/glsa/202309-06
reference_id GLSA-202309-06
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-03-06T20:38:03Z/
url https://security.gentoo.org/glsa/202309-06
8
reference_url https://usn.ubuntu.com/5822-1/
reference_id USN-5822-1
reference_type
scores
url https://usn.ubuntu.com/5822-1/
9
reference_url https://usn.ubuntu.com/5936-1/
reference_id USN-5936-1
reference_type
scores
url https://usn.ubuntu.com/5936-1/
10
reference_url https://usn.ubuntu.com/7582-1/
reference_id USN-7582-1
reference_type
scores
url https://usn.ubuntu.com/7582-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.16.0%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.16.0%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.16.0%252Bdfsg-2%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2022-45141
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7xdg-sn88-bkbs
53
url VCID-84q8-2457-qkc5
vulnerability_id VCID-84q8-2457-qkc5
summary Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-37967.json
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-37967.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-37967
reference_id
reference_type
scores
0
value 0.02981
scoring_system epss
scoring_elements 0.8654
published_at 2026-04-21T12:55:00Z
1
value 0.02981
scoring_system epss
scoring_elements 0.86532
published_at 2026-04-12T12:55:00Z
2
value 0.02981
scoring_system epss
scoring_elements 0.86526
published_at 2026-04-13T12:55:00Z
3
value 0.02981
scoring_system epss
scoring_elements 0.86541
published_at 2026-04-16T12:55:00Z
4
value 0.02981
scoring_system epss
scoring_elements 0.86547
published_at 2026-04-18T12:55:00Z
5
value 0.02981
scoring_system epss
scoring_elements 0.86474
published_at 2026-04-02T12:55:00Z
6
value 0.02981
scoring_system epss
scoring_elements 0.86492
published_at 2026-04-07T12:55:00Z
7
value 0.02981
scoring_system epss
scoring_elements 0.86511
published_at 2026-04-08T12:55:00Z
8
value 0.02981
scoring_system epss
scoring_elements 0.8652
published_at 2026-04-09T12:55:00Z
9
value 0.02981
scoring_system epss
scoring_elements 0.86535
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-37967
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37967
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2154320
reference_id 2154320
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2154320
5
reference_url https://security.archlinux.org/AVG-2828
reference_id AVG-2828
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2828
6
reference_url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37967
reference_id CVE-2022-37967
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T13:57:00Z/
url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37967
7
reference_url https://security.gentoo.org/glsa/202309-06
reference_id GLSA-202309-06
reference_type
scores
url https://security.gentoo.org/glsa/202309-06
8
reference_url https://usn.ubuntu.com/5822-1/
reference_id USN-5822-1
reference_type
scores
url https://usn.ubuntu.com/5822-1/
9
reference_url https://usn.ubuntu.com/5936-1/
reference_id USN-5936-1
reference_type
scores
url https://usn.ubuntu.com/5936-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.17.4%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.17.4%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.4%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2022-37967
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-84q8-2457-qkc5
54
url VCID-88cg-p9pf-fbad
vulnerability_id VCID-88cg-p9pf-fbad
summary samba: Some code path don't enforce smb signing, when they should (incomplete fix of CVE-2017-12150)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15085.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15085.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15085
reference_id
reference_type
scores
0
value 0.00279
scoring_system epss
scoring_elements 0.5122
published_at 2026-04-01T12:55:00Z
1
value 0.00279
scoring_system epss
scoring_elements 0.51347
published_at 2026-04-21T12:55:00Z
2
value 0.00279
scoring_system epss
scoring_elements 0.51359
published_at 2026-04-16T12:55:00Z
3
value 0.00279
scoring_system epss
scoring_elements 0.51367
published_at 2026-04-18T12:55:00Z
4
value 0.00279
scoring_system epss
scoring_elements 0.51272
published_at 2026-04-02T12:55:00Z
5
value 0.00279
scoring_system epss
scoring_elements 0.51297
published_at 2026-04-04T12:55:00Z
6
value 0.00279
scoring_system epss
scoring_elements 0.51256
published_at 2026-04-07T12:55:00Z
7
value 0.00279
scoring_system epss
scoring_elements 0.51312
published_at 2026-04-08T12:55:00Z
8
value 0.00279
scoring_system epss
scoring_elements 0.51308
published_at 2026-04-09T12:55:00Z
9
value 0.00279
scoring_system epss
scoring_elements 0.51352
published_at 2026-04-11T12:55:00Z
10
value 0.00279
scoring_system epss
scoring_elements 0.51331
published_at 2026-04-12T12:55:00Z
11
value 0.00279
scoring_system epss
scoring_elements 0.51317
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15085
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15085
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15085
3
reference_url http://www.securityfocus.com/bid/101554
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101554
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1505787
reference_id 1505787
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1505787
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:gluster_storage:3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:gluster_storage:3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:gluster_storage:3.3:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15085
reference_id CVE-2017-15085
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-15085
8
reference_url https://access.redhat.com/errata/RHSA-2017:3110
reference_id RHSA-2017:3110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3110
fixed_packages
0
url pkg:deb/debian/samba@0?distro=trixie
purl pkg:deb/debian/samba@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@0%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2017-15085
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-88cg-p9pf-fbad
55
url VCID-88mw-c7mc-jugp
vulnerability_id VCID-88mw-c7mc-jugp
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14323.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14323.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14323
reference_id
reference_type
scores
0
value 0.00421
scoring_system epss
scoring_elements 0.6207
published_at 2026-04-21T12:55:00Z
1
value 0.00421
scoring_system epss
scoring_elements 0.6191
published_at 2026-04-01T12:55:00Z
2
value 0.00421
scoring_system epss
scoring_elements 0.61983
published_at 2026-04-02T12:55:00Z
3
value 0.00421
scoring_system epss
scoring_elements 0.62015
published_at 2026-04-04T12:55:00Z
4
value 0.00421
scoring_system epss
scoring_elements 0.61985
published_at 2026-04-07T12:55:00Z
5
value 0.00421
scoring_system epss
scoring_elements 0.62034
published_at 2026-04-08T12:55:00Z
6
value 0.00421
scoring_system epss
scoring_elements 0.62051
published_at 2026-04-09T12:55:00Z
7
value 0.00421
scoring_system epss
scoring_elements 0.62072
published_at 2026-04-11T12:55:00Z
8
value 0.00421
scoring_system epss
scoring_elements 0.62061
published_at 2026-04-12T12:55:00Z
9
value 0.00421
scoring_system epss
scoring_elements 0.6204
published_at 2026-04-13T12:55:00Z
10
value 0.00421
scoring_system epss
scoring_elements 0.62082
published_at 2026-04-16T12:55:00Z
11
value 0.00421
scoring_system epss
scoring_elements 0.62088
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14323
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14323
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1891685
reference_id 1891685
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T20:46:57Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=1891685
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973399
reference_id 973399
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973399
6
reference_url https://www.samba.org/samba/security/CVE-2020-14323.html
reference_id CVE-2020-14323.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T20:46:57Z/
url https://www.samba.org/samba/security/CVE-2020-14323.html
7
reference_url https://security.gentoo.org/glsa/202012-24
reference_id GLSA-202012-24
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T20:46:57Z/
url https://security.gentoo.org/glsa/202012-24
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JE2M4FE3N3EDXVG4UKSVFPL7SQUGFFDP/
reference_id JE2M4FE3N3EDXVG4UKSVFPL7SQUGFFDP
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T20:46:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JE2M4FE3N3EDXVG4UKSVFPL7SQUGFFDP/
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T20:46:57Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00008.html
10
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00012.html
reference_id msg00012.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T20:46:57Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00012.html
11
reference_url https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html
reference_id msg00015.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T20:46:57Z/
url https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html
12
reference_url https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html
reference_id msg00041.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T20:46:57Z/
url https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html
13
reference_url https://security.netapp.com/advisory/ntap-20201103-0001/
reference_id ntap-20201103-0001
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T20:46:57Z/
url https://security.netapp.com/advisory/ntap-20201103-0001/
14
reference_url https://access.redhat.com/errata/RHSA-2020:5439
reference_id RHSA-2020:5439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5439
15
reference_url https://access.redhat.com/errata/RHSA-2021:1647
reference_id RHSA-2021:1647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1647
16
reference_url https://access.redhat.com/errata/RHSA-2021:3723
reference_id RHSA-2021:3723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3723
17
reference_url https://usn.ubuntu.com/4611-1/
reference_id USN-4611-1
reference_type
scores
url https://usn.ubuntu.com/4611-1/
18
reference_url https://usn.ubuntu.com/4931-1/
reference_id USN-4931-1
reference_type
scores
url https://usn.ubuntu.com/4931-1/
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6HM73N4NEGFW5GIJJGGP6ZZBS6GTXPB/
reference_id W6HM73N4NEGFW5GIJJGGP6ZZBS6GTXPB
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T20:46:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6HM73N4NEGFW5GIJJGGP6ZZBS6GTXPB/
fixed_packages
0
url pkg:deb/debian/samba@2:4.13.2%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.13.2%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.2%252Bdfsg-2%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2020-14323
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-88mw-c7mc-jugp
56
url VCID-8c85-jme1-1qes
vulnerability_id VCID-8c85-jme1-1qes
summary
Samba contains a buffer overflow vulnerability potentially resulting in the
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6015.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6015.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-6015
reference_id
reference_type
scores
0
value 0.42667
scoring_system epss
scoring_elements 0.97446
published_at 2026-04-01T12:55:00Z
1
value 0.42667
scoring_system epss
scoring_elements 0.97453
published_at 2026-04-02T12:55:00Z
2
value 0.42667
scoring_system epss
scoring_elements 0.97457
published_at 2026-04-04T12:55:00Z
3
value 0.42667
scoring_system epss
scoring_elements 0.97458
published_at 2026-04-07T12:55:00Z
4
value 0.48861
scoring_system epss
scoring_elements 0.97753
published_at 2026-04-08T12:55:00Z
5
value 0.48861
scoring_system epss
scoring_elements 0.97757
published_at 2026-04-09T12:55:00Z
6
value 0.48861
scoring_system epss
scoring_elements 0.97759
published_at 2026-04-11T12:55:00Z
7
value 0.48861
scoring_system epss
scoring_elements 0.97761
published_at 2026-04-12T12:55:00Z
8
value 0.48861
scoring_system epss
scoring_elements 0.97763
published_at 2026-04-13T12:55:00Z
9
value 0.48861
scoring_system epss
scoring_elements 0.97768
published_at 2026-04-16T12:55:00Z
10
value 0.48861
scoring_system epss
scoring_elements 0.97771
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-6015
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6015
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6015
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=396401
reference_id 396401
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=396401
4
reference_url https://security.gentoo.org/glsa/200712-10
reference_id GLSA-200712-10
reference_type
scores
url https://security.gentoo.org/glsa/200712-10
5
reference_url http://secunia.com/secunia_research/2007-99/advisory/
reference_id OSVDB-39191;CVE-2007-6015
reference_type exploit
scores
url http://secunia.com/secunia_research/2007-99/advisory/
6
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/4732.c
reference_id OSVDB-39191;CVE-2007-6015
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/4732.c
7
reference_url https://access.redhat.com/errata/RHSA-2007:1114
reference_id RHSA-2007:1114
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1114
8
reference_url https://access.redhat.com/errata/RHSA-2007:1117
reference_id RHSA-2007:1117
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1117
9
reference_url https://usn.ubuntu.com/556-1/
reference_id USN-556-1
reference_type
scores
url https://usn.ubuntu.com/556-1/
fixed_packages
0
url pkg:deb/debian/samba@3.0.28-1?distro=trixie
purl pkg:deb/debian/samba@3.0.28-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@3.0.28-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2007-6015
risk_score 0.8
exploitability 2.0
weighted_severity 0.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8c85-jme1-1qes
57
url VCID-8uqh-s6xh-vycb
vulnerability_id VCID-8uqh-s6xh-vycb
summary security update
references
0
reference_url http://badlock.org/
reference_id
reference_type
scores
url http://badlock.org/
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html
10
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html
11
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html
12
reference_url http://rhn.redhat.com/errata/RHSA-2016-0611.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0611.html
13
reference_url http://rhn.redhat.com/errata/RHSA-2016-0612.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0612.html
14
reference_url http://rhn.redhat.com/errata/RHSA-2016-0613.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0613.html
15
reference_url http://rhn.redhat.com/errata/RHSA-2016-0614.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0614.html
16
reference_url http://rhn.redhat.com/errata/RHSA-2016-0618.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0618.html
17
reference_url http://rhn.redhat.com/errata/RHSA-2016-0619.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0619.html
18
reference_url http://rhn.redhat.com/errata/RHSA-2016-0620.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0620.html
19
reference_url http://rhn.redhat.com/errata/RHSA-2016-0624.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0624.html
20
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5370.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5370.json
21
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5370
reference_id
reference_type
scores
0
value 0.25475
scoring_system epss
scoring_elements 0.96233
published_at 2026-04-21T12:55:00Z
1
value 0.25475
scoring_system epss
scoring_elements 0.96228
published_at 2026-04-16T12:55:00Z
2
value 0.25475
scoring_system epss
scoring_elements 0.96232
published_at 2026-04-18T12:55:00Z
3
value 0.25475
scoring_system epss
scoring_elements 0.96181
published_at 2026-04-01T12:55:00Z
4
value 0.25475
scoring_system epss
scoring_elements 0.96189
published_at 2026-04-02T12:55:00Z
5
value 0.25475
scoring_system epss
scoring_elements 0.96197
published_at 2026-04-04T12:55:00Z
6
value 0.25475
scoring_system epss
scoring_elements 0.96201
published_at 2026-04-07T12:55:00Z
7
value 0.25475
scoring_system epss
scoring_elements 0.96211
published_at 2026-04-08T12:55:00Z
8
value 0.25475
scoring_system epss
scoring_elements 0.96214
published_at 2026-04-09T12:55:00Z
9
value 0.25475
scoring_system epss
scoring_elements 0.96218
published_at 2026-04-11T12:55:00Z
10
value 0.25475
scoring_system epss
scoring_elements 0.96217
published_at 2026-04-12T12:55:00Z
11
value 0.25475
scoring_system epss
scoring_elements 0.96219
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5370
22
reference_url https://bto.bluecoat.com/security-advisory/sa122
reference_id
reference_type
scores
url https://bto.bluecoat.com/security-advisory/sa122
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2114
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2114
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118
31
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
32
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399
33
reference_url https://www.samba.org/samba/history/samba-4.2.10.html
reference_id
reference_type
scores
url https://www.samba.org/samba/history/samba-4.2.10.html
34
reference_url https://www.samba.org/samba/latest_news.html#4.4.2
reference_id
reference_type
scores
url https://www.samba.org/samba/latest_news.html#4.4.2
35
reference_url https://www.samba.org/samba/security/CVE-2015-5370.html
reference_id
reference_type
scores
url https://www.samba.org/samba/security/CVE-2015-5370.html
36
reference_url http://www.debian.org/security/2016/dsa-3548
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3548
37
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
38
reference_url http://www.securitytracker.com/id/1035533
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035533
39
reference_url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.458012
reference_id
reference_type
scores
url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.458012
40
reference_url http://www.ubuntu.com/usn/USN-2950-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2950-1
41
reference_url http://www.ubuntu.com/usn/USN-2950-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2950-2
42
reference_url http://www.ubuntu.com/usn/USN-2950-3
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2950-3
43
reference_url http://www.ubuntu.com/usn/USN-2950-4
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2950-4
44
reference_url http://www.ubuntu.com/usn/USN-2950-5
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2950-5
45
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1309987
reference_id 1309987
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1309987
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.24:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.25:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.25:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.26:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.23:*:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.9:*:*:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*
138
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*
139
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*
140
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*
141
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*
142
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.6:*:*:*:*:*:*:*
143
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:*:*:*:*:*:*:*
144
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
145
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
146
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
147
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-5370
reference_id CVE-2015-5370
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-5370
148
reference_url https://access.redhat.com/errata/RHSA-2016:0611
reference_id RHSA-2016:0611
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0611
149
reference_url https://access.redhat.com/errata/RHSA-2016:0612
reference_id RHSA-2016:0612
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0612
150
reference_url https://access.redhat.com/errata/RHSA-2016:0613
reference_id RHSA-2016:0613
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0613
151
reference_url https://access.redhat.com/errata/RHSA-2016:0614
reference_id RHSA-2016:0614
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0614
152
reference_url https://access.redhat.com/errata/RHSA-2016:0618
reference_id RHSA-2016:0618
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0618
153
reference_url https://access.redhat.com/errata/RHSA-2016:0619
reference_id RHSA-2016:0619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0619
154
reference_url https://access.redhat.com/errata/RHSA-2016:0620
reference_id RHSA-2016:0620
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0620
155
reference_url https://access.redhat.com/errata/RHSA-2016:0624
reference_id RHSA-2016:0624
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0624
156
reference_url https://usn.ubuntu.com/2950-1/
reference_id USN-2950-1
reference_type
scores
url https://usn.ubuntu.com/2950-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.3.7%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.3.7%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.3.7%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2015-5370
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8uqh-s6xh-vycb
58
url VCID-94k8-98me-x3dw
vulnerability_id VCID-94k8-98me-x3dw
summary Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44141.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44141.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-44141
reference_id
reference_type
scores
0
value 0.00308
scoring_system epss
scoring_elements 0.54051
published_at 2026-04-21T12:55:00Z
1
value 0.00308
scoring_system epss
scoring_elements 0.54013
published_at 2026-04-09T12:55:00Z
2
value 0.00308
scoring_system epss
scoring_elements 0.5406
published_at 2026-04-11T12:55:00Z
3
value 0.00308
scoring_system epss
scoring_elements 0.54042
published_at 2026-04-12T12:55:00Z
4
value 0.00308
scoring_system epss
scoring_elements 0.54024
published_at 2026-04-13T12:55:00Z
5
value 0.00308
scoring_system epss
scoring_elements 0.54064
published_at 2026-04-16T12:55:00Z
6
value 0.00308
scoring_system epss
scoring_elements 0.54068
published_at 2026-04-18T12:55:00Z
7
value 0.00309
scoring_system epss
scoring_elements 0.54015
published_at 2026-04-02T12:55:00Z
8
value 0.00309
scoring_system epss
scoring_elements 0.54018
published_at 2026-04-07T12:55:00Z
9
value 0.00309
scoring_system epss
scoring_elements 0.5407
published_at 2026-04-08T12:55:00Z
10
value 0.00309
scoring_system epss
scoring_elements 0.53997
published_at 2026-04-01T12:55:00Z
11
value 0.00309
scoring_system epss
scoring_elements 0.54041
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-44141
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44141
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44141
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004692
reference_id 1004692
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004692
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2046120
reference_id 2046120
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2046120
6
reference_url https://security.archlinux.org/AVG-2648
reference_id AVG-2648
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2648
7
reference_url https://security.gentoo.org/glsa/202309-06
reference_id GLSA-202309-06
reference_type
scores
url https://security.gentoo.org/glsa/202309-06
8
reference_url https://access.redhat.com/errata/RHSA-2022:1756
reference_id RHSA-2022:1756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1756
9
reference_url https://access.redhat.com/errata/RHSA-2022:2074
reference_id RHSA-2022:2074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2074
fixed_packages
0
url pkg:deb/debian/samba@2:4.16.0%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.16.0%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.16.0%252Bdfsg-2%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2021-44141
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-94k8-98me-x3dw
59
url VCID-9cyh-d77a-vyhj
vulnerability_id VCID-9cyh-d77a-vyhj
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20254.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20254.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-20254
reference_id
reference_type
scores
0
value 0.01764
scoring_system epss
scoring_elements 0.82549
published_at 2026-04-01T12:55:00Z
1
value 0.01764
scoring_system epss
scoring_elements 0.8266
published_at 2026-04-21T12:55:00Z
2
value 0.01764
scoring_system epss
scoring_elements 0.82655
published_at 2026-04-16T12:55:00Z
3
value 0.01764
scoring_system epss
scoring_elements 0.82656
published_at 2026-04-18T12:55:00Z
4
value 0.01764
scoring_system epss
scoring_elements 0.82564
published_at 2026-04-02T12:55:00Z
5
value 0.01764
scoring_system epss
scoring_elements 0.8258
published_at 2026-04-04T12:55:00Z
6
value 0.01764
scoring_system epss
scoring_elements 0.82576
published_at 2026-04-07T12:55:00Z
7
value 0.01764
scoring_system epss
scoring_elements 0.82602
published_at 2026-04-08T12:55:00Z
8
value 0.01764
scoring_system epss
scoring_elements 0.8261
published_at 2026-04-09T12:55:00Z
9
value 0.01764
scoring_system epss
scoring_elements 0.82628
published_at 2026-04-11T12:55:00Z
10
value 0.01764
scoring_system epss
scoring_elements 0.82622
published_at 2026-04-12T12:55:00Z
11
value 0.01764
scoring_system epss
scoring_elements 0.82618
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-20254
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20254
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20254
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1949442
reference_id 1949442
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1949442
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987811
reference_id 987811
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987811
6
reference_url https://security.archlinux.org/AVG-1893
reference_id AVG-1893
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1893
7
reference_url https://security.gentoo.org/glsa/202105-22
reference_id GLSA-202105-22
reference_type
scores
url https://security.gentoo.org/glsa/202105-22
8
reference_url https://access.redhat.com/errata/RHSA-2021:2313
reference_id RHSA-2021:2313
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2313
9
reference_url https://access.redhat.com/errata/RHSA-2021:3723
reference_id RHSA-2021:3723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3723
10
reference_url https://access.redhat.com/errata/RHSA-2021:3724
reference_id RHSA-2021:3724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3724
11
reference_url https://access.redhat.com/errata/RHSA-2021:3988
reference_id RHSA-2021:3988
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3988
12
reference_url https://access.redhat.com/errata/RHSA-2021:4058
reference_id RHSA-2021:4058
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4058
13
reference_url https://access.redhat.com/errata/RHSA-2021:4866
reference_id RHSA-2021:4866
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4866
14
reference_url https://usn.ubuntu.com/4930-1/
reference_id USN-4930-1
reference_type
scores
url https://usn.ubuntu.com/4930-1/
15
reference_url https://usn.ubuntu.com/4931-1/
reference_id USN-4931-1
reference_type
scores
url https://usn.ubuntu.com/4931-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.13.5%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.13.5%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.5%252Bdfsg-2%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2021-20254
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9cyh-d77a-vyhj
60
url VCID-9pjy-1k8p-abh5
vulnerability_id VCID-9pjy-1k8p-abh5
summary samba: Server memory information leak over SMB1 (incomplete fix for CVE-2017-12163)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15087.json
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15087.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15087
reference_id
reference_type
scores
0
value 0.00326
scoring_system epss
scoring_elements 0.55467
published_at 2026-04-01T12:55:00Z
1
value 0.00326
scoring_system epss
scoring_elements 0.55628
published_at 2026-04-21T12:55:00Z
2
value 0.00326
scoring_system epss
scoring_elements 0.55607
published_at 2026-04-13T12:55:00Z
3
value 0.00326
scoring_system epss
scoring_elements 0.55649
published_at 2026-04-18T12:55:00Z
4
value 0.00326
scoring_system epss
scoring_elements 0.55579
published_at 2026-04-02T12:55:00Z
5
value 0.00326
scoring_system epss
scoring_elements 0.55603
published_at 2026-04-04T12:55:00Z
6
value 0.00326
scoring_system epss
scoring_elements 0.55581
published_at 2026-04-07T12:55:00Z
7
value 0.00326
scoring_system epss
scoring_elements 0.55633
published_at 2026-04-08T12:55:00Z
8
value 0.00326
scoring_system epss
scoring_elements 0.55636
published_at 2026-04-09T12:55:00Z
9
value 0.00326
scoring_system epss
scoring_elements 0.55645
published_at 2026-04-16T12:55:00Z
10
value 0.00326
scoring_system epss
scoring_elements 0.55625
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15087
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15087
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15087
3
reference_url http://www.securityfocus.com/bid/101556
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101556
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1505788
reference_id 1505788
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1505788
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:gluster_storage:3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:gluster_storage:3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:gluster_storage:3.3:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15087
reference_id CVE-2017-15087
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-15087
8
reference_url https://access.redhat.com/errata/RHSA-2017:3110
reference_id RHSA-2017:3110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3110
fixed_packages
0
url pkg:deb/debian/samba@0?distro=trixie
purl pkg:deb/debian/samba@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@0%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2017-15087
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9pjy-1k8p-abh5
61
url VCID-9qgn-4991-37gb
vulnerability_id VCID-9qgn-4991-37gb
summary
A heap-based buffer overflow vulnerability was found in Samba, allowing for
    the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1105.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1105.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-1105
reference_id
reference_type
scores
0
value 0.85727
scoring_system epss
scoring_elements 0.99372
published_at 2026-04-01T12:55:00Z
1
value 0.85727
scoring_system epss
scoring_elements 0.99373
published_at 2026-04-02T12:55:00Z
2
value 0.85727
scoring_system epss
scoring_elements 0.99374
published_at 2026-04-04T12:55:00Z
3
value 0.85727
scoring_system epss
scoring_elements 0.99375
published_at 2026-04-07T12:55:00Z
4
value 0.85727
scoring_system epss
scoring_elements 0.99376
published_at 2026-04-08T12:55:00Z
5
value 0.85727
scoring_system epss
scoring_elements 0.99377
published_at 2026-04-09T12:55:00Z
6
value 0.85727
scoring_system epss
scoring_elements 0.99378
published_at 2026-04-13T12:55:00Z
7
value 0.85727
scoring_system epss
scoring_elements 0.9938
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-1105
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1105
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1105
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=446724
reference_id 446724
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=446724
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=483410
reference_id 483410
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=483410
5
reference_url https://security.gentoo.org/glsa/200805-23
reference_id GLSA-200805-23
reference_type
scores
url https://security.gentoo.org/glsa/200805-23
6
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/5712.pl
reference_id OSVDB-45657;CVE-2008-4189;CVE-2008-1105
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/5712.pl
7
reference_url https://access.redhat.com/errata/RHSA-2008:0288
reference_id RHSA-2008:0288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0288
8
reference_url https://access.redhat.com/errata/RHSA-2008:0289
reference_id RHSA-2008:0289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0289
9
reference_url https://access.redhat.com/errata/RHSA-2008:0290
reference_id RHSA-2008:0290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0290
10
reference_url https://usn.ubuntu.com/617-1/
reference_id USN-617-1
reference_type
scores
url https://usn.ubuntu.com/617-1/
11
reference_url https://usn.ubuntu.com/617-2/
reference_id USN-617-2
reference_type
scores
url https://usn.ubuntu.com/617-2/
fixed_packages
0
url pkg:deb/debian/samba@1:3.0.30-1?distro=trixie
purl pkg:deb/debian/samba@1:3.0.30-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@1:3.0.30-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2008-1105
risk_score 1.6
exploitability 2.0
weighted_severity 0.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9qgn-4991-37gb
62
url VCID-9smc-af63-x7cg
vulnerability_id VCID-9smc-af63-x7cg
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which may allow execution of arbitrary code with root privileges.
references
0
reference_url http://badlock.org/
reference_id
reference_type
scores
url http://badlock.org/
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html
10
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html
11
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html
12
reference_url http://rhn.redhat.com/errata/RHSA-2016-0612.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0612.html
13
reference_url http://rhn.redhat.com/errata/RHSA-2016-0614.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0614.html
14
reference_url http://rhn.redhat.com/errata/RHSA-2016-0618.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0618.html
15
reference_url http://rhn.redhat.com/errata/RHSA-2016-0620.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0620.html
16
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2113.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2113.json
17
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2113
reference_id
reference_type
scores
0
value 0.06295
scoring_system epss
scoring_elements 0.90973
published_at 2026-04-21T12:55:00Z
1
value 0.06295
scoring_system epss
scoring_elements 0.90974
published_at 2026-04-16T12:55:00Z
2
value 0.06295
scoring_system epss
scoring_elements 0.90972
published_at 2026-04-18T12:55:00Z
3
value 0.06295
scoring_system epss
scoring_elements 0.90899
published_at 2026-04-01T12:55:00Z
4
value 0.06295
scoring_system epss
scoring_elements 0.90904
published_at 2026-04-02T12:55:00Z
5
value 0.06295
scoring_system epss
scoring_elements 0.90914
published_at 2026-04-04T12:55:00Z
6
value 0.06295
scoring_system epss
scoring_elements 0.90924
published_at 2026-04-07T12:55:00Z
7
value 0.06295
scoring_system epss
scoring_elements 0.90935
published_at 2026-04-08T12:55:00Z
8
value 0.06295
scoring_system epss
scoring_elements 0.90942
published_at 2026-04-09T12:55:00Z
9
value 0.06295
scoring_system epss
scoring_elements 0.9095
published_at 2026-04-13T12:55:00Z
10
value 0.06295
scoring_system epss
scoring_elements 0.90951
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2113
18
reference_url https://bto.bluecoat.com/security-advisory/sa122
reference_id
reference_type
scores
url https://bto.bluecoat.com/security-advisory/sa122
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2114
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2114
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118
27
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:A/AC:M/Au:N/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
28
reference_url https://www.samba.org/samba/history/samba-4.2.10.html
reference_id
reference_type
scores
url https://www.samba.org/samba/history/samba-4.2.10.html
29
reference_url https://www.samba.org/samba/latest_news.html#4.4.2
reference_id
reference_type
scores
url https://www.samba.org/samba/latest_news.html#4.4.2
30
reference_url https://www.samba.org/samba/security/CVE-2016-2113.html
reference_id
reference_type
scores
url https://www.samba.org/samba/security/CVE-2016-2113.html
31
reference_url http://www.debian.org/security/2016/dsa-3548
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3548
32
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
33
reference_url http://www.securitytracker.com/id/1035533
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035533
34
reference_url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.458012
reference_id
reference_type
scores
url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.458012
35
reference_url http://www.ubuntu.com/usn/USN-2950-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2950-1
36
reference_url http://www.ubuntu.com/usn/USN-2950-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2950-2
37
reference_url http://www.ubuntu.com/usn/USN-2950-3
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2950-3
38
reference_url http://www.ubuntu.com/usn/USN-2950-4
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2950-4
39
reference_url http://www.ubuntu.com/usn/USN-2950-5
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2950-5
40
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1311910
reference_id 1311910
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1311910
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.25:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.26:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.23:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.9:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.6:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
116
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-2113
reference_id CVE-2016-2113
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
1
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-2113
117
reference_url https://security.gentoo.org/glsa/201612-47
reference_id GLSA-201612-47
reference_type
scores
url https://security.gentoo.org/glsa/201612-47
118
reference_url https://access.redhat.com/errata/RHSA-2016:0612
reference_id RHSA-2016:0612
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0612
119
reference_url https://access.redhat.com/errata/RHSA-2016:0614
reference_id RHSA-2016:0614
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0614
120
reference_url https://access.redhat.com/errata/RHSA-2016:0618
reference_id RHSA-2016:0618
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0618
121
reference_url https://access.redhat.com/errata/RHSA-2016:0620
reference_id RHSA-2016:0620
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0620
122
reference_url https://usn.ubuntu.com/2950-1/
reference_id USN-2950-1
reference_type
scores
url https://usn.ubuntu.com/2950-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.3.7%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.3.7%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.3.7%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2016-2113
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9smc-af63-x7cg
63
url VCID-9t1m-6chr-e3dt
vulnerability_id VCID-9t1m-6chr-e3dt
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10745.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10745.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-10745
reference_id
reference_type
scores
0
value 0.19658
scoring_system epss
scoring_elements 0.95388
published_at 2026-04-01T12:55:00Z
1
value 0.19658
scoring_system epss
scoring_elements 0.95439
published_at 2026-04-21T12:55:00Z
2
value 0.19658
scoring_system epss
scoring_elements 0.95431
published_at 2026-04-16T12:55:00Z
3
value 0.19658
scoring_system epss
scoring_elements 0.95435
published_at 2026-04-18T12:55:00Z
4
value 0.19658
scoring_system epss
scoring_elements 0.95397
published_at 2026-04-02T12:55:00Z
5
value 0.19658
scoring_system epss
scoring_elements 0.95403
published_at 2026-04-04T12:55:00Z
6
value 0.19658
scoring_system epss
scoring_elements 0.95406
published_at 2026-04-07T12:55:00Z
7
value 0.19658
scoring_system epss
scoring_elements 0.95413
published_at 2026-04-08T12:55:00Z
8
value 0.19658
scoring_system epss
scoring_elements 0.95416
published_at 2026-04-09T12:55:00Z
9
value 0.19658
scoring_system epss
scoring_elements 0.95421
published_at 2026-04-12T12:55:00Z
10
value 0.19658
scoring_system epss
scoring_elements 0.95423
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-10745
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10745
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1849491
reference_id 1849491
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1849491
5
reference_url https://security.archlinux.org/AVG-1202
reference_id AVG-1202
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1202
6
reference_url https://security.gentoo.org/glsa/202007-15
reference_id GLSA-202007-15
reference_type
scores
url https://security.gentoo.org/glsa/202007-15
7
reference_url https://usn.ubuntu.com/4409-1/
reference_id USN-4409-1
reference_type
scores
url https://usn.ubuntu.com/4409-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.12.5%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.12.5%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.12.5%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2020-10745
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9t1m-6chr-e3dt
64
url VCID-a1wd-zc1z-47cr
vulnerability_id VCID-a1wd-zc1z-47cr
summary The Samba server on Apple Mac OS X 10.3.9 and 10.4.10, when Windows file sharing is enabled, does not enforce disk quotas after dropping privileges, which allows remote authenticated users to use disk space in excess of quota.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2407.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2407.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-2407
reference_id
reference_type
scores
0
value 0.02903
scoring_system epss
scoring_elements 0.86294
published_at 2026-04-01T12:55:00Z
1
value 0.02903
scoring_system epss
scoring_elements 0.86304
published_at 2026-04-02T12:55:00Z
2
value 0.02903
scoring_system epss
scoring_elements 0.86322
published_at 2026-04-04T12:55:00Z
3
value 0.02903
scoring_system epss
scoring_elements 0.86323
published_at 2026-04-07T12:55:00Z
4
value 0.02903
scoring_system epss
scoring_elements 0.86341
published_at 2026-04-08T12:55:00Z
5
value 0.02903
scoring_system epss
scoring_elements 0.86351
published_at 2026-04-09T12:55:00Z
6
value 0.02903
scoring_system epss
scoring_elements 0.86365
published_at 2026-04-11T12:55:00Z
7
value 0.02903
scoring_system epss
scoring_elements 0.86363
published_at 2026-04-12T12:55:00Z
8
value 0.02903
scoring_system epss
scoring_elements 0.86358
published_at 2026-04-13T12:55:00Z
9
value 0.02903
scoring_system epss
scoring_elements 0.86374
published_at 2026-04-16T12:55:00Z
10
value 0.02903
scoring_system epss
scoring_elements 0.86379
published_at 2026-04-18T12:55:00Z
11
value 0.02903
scoring_system epss
scoring_elements 0.86372
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-2407
fixed_packages
0
url pkg:deb/debian/samba@0?distro=trixie
purl pkg:deb/debian/samba@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@0%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2007-2407
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a1wd-zc1z-47cr
65
url VCID-a653-r4dy-bba9
vulnerability_id VCID-a653-r4dy-bba9
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7494.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7494.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7494
reference_id
reference_type
scores
0
value 0.94176
scoring_system epss
scoring_elements 0.99918
published_at 2026-04-21T12:55:00Z
1
value 0.94176
scoring_system epss
scoring_elements 0.99917
published_at 2026-04-02T12:55:00Z
2
value 0.94245
scoring_system epss
scoring_elements 0.99929
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7494
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7494
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:C/I:C/A:C
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url http://www.securitytracker.com/id/1038552
reference_id 1038552
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:29:34Z/
url http://www.securitytracker.com/id/1038552
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1450347
reference_id 1450347
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1450347
6
reference_url https://www.exploit-db.com/exploits/42060/
reference_id 42060
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:29:34Z/
url https://www.exploit-db.com/exploits/42060/
7
reference_url https://www.exploit-db.com/exploits/42084/
reference_id 42084
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:29:34Z/
url https://www.exploit-db.com/exploits/42084/
8
reference_url http://www.securityfocus.com/bid/98636
reference_id 98636
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:29:34Z/
url http://www.securityfocus.com/bid/98636
9
reference_url https://security.archlinux.org/ASA-201705-22
reference_id ASA-201705-22
reference_type
scores
url https://security.archlinux.org/ASA-201705-22
10
reference_url https://security.archlinux.org/AVG-279
reference_id AVG-279
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-279
11
reference_url https://github.com/rapid7/metasploit-framework/blob/ae22b4ccf4a3dde77ec339d83091b057aa7e9a77/modules/exploits/linux/samba/is_known_pipename.rb
reference_id CVE-2017-7494
reference_type exploit
scores
url https://github.com/rapid7/metasploit-framework/blob/ae22b4ccf4a3dde77ec339d83091b057aa7e9a77/modules/exploits/linux/samba/is_known_pipename.rb
12
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/42060.py
reference_id CVE-2017-7494
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/42060.py
13
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/42084.rb
reference_id CVE-2017-7494
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/42084.rb
14
reference_url https://www.samba.org/samba/security/CVE-2017-7494.html
reference_id CVE-2017-7494.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:29:34Z/
url https://www.samba.org/samba/security/CVE-2017-7494.html
15
reference_url https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbns03755en_us
reference_id display?docLocale=en_US&docId=emr_na-hpesbns03755en_us
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:29:34Z/
url https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbns03755en_us
16
reference_url https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03759en_us
reference_id display?docLocale=en_US&docId=emr_na-hpesbux03759en_us
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:29:34Z/
url https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03759en_us
17
reference_url http://www.debian.org/security/2017/dsa-3860
reference_id dsa-3860
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:29:34Z/
url http://www.debian.org/security/2017/dsa-3860
18
reference_url https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet&p_File_Name=SEVD-2018-095-01+Security+Notification+Umotion+V1.1.pdf&p_Doc_Ref=SEVD-2018-095-01
reference_id files?p_enDocType=Technical+leaflet&p_File_Name=SEVD-2018-095-01+Security+Notification+Umotion+V1.1.pdf&p_Doc_Ref=SEVD-2018-095-01
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:29:34Z/
url https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet&p_File_Name=SEVD-2018-095-01+Security+Notification+Umotion+V1.1.pdf&p_Doc_Ref=SEVD-2018-095-01
19
reference_url https://security.gentoo.org/glsa/201805-07
reference_id GLSA-201805-07
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:29:34Z/
url https://security.gentoo.org/glsa/201805-07
20
reference_url https://security.netapp.com/advisory/ntap-20170524-0001/
reference_id ntap-20170524-0001
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:29:34Z/
url https://security.netapp.com/advisory/ntap-20170524-0001/
21
reference_url https://access.redhat.com/errata/RHSA-2017:1270
reference_id RHSA-2017:1270
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:29:34Z/
url https://access.redhat.com/errata/RHSA-2017:1270
22
reference_url https://access.redhat.com/errata/RHSA-2017:1271
reference_id RHSA-2017:1271
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:29:34Z/
url https://access.redhat.com/errata/RHSA-2017:1271
23
reference_url https://access.redhat.com/errata/RHSA-2017:1272
reference_id RHSA-2017:1272
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:29:34Z/
url https://access.redhat.com/errata/RHSA-2017:1272
24
reference_url https://access.redhat.com/errata/RHSA-2017:1273
reference_id RHSA-2017:1273
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:29:34Z/
url https://access.redhat.com/errata/RHSA-2017:1273
25
reference_url https://access.redhat.com/errata/RHSA-2017:1390
reference_id RHSA-2017:1390
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:29:34Z/
url https://access.redhat.com/errata/RHSA-2017:1390
26
reference_url https://usn.ubuntu.com/3296-1/
reference_id USN-3296-1
reference_type
scores
url https://usn.ubuntu.com/3296-1/
27
reference_url https://usn.ubuntu.com/3296-2/
reference_id USN-3296-2
reference_type
scores
url https://usn.ubuntu.com/3296-2/
fixed_packages
0
url pkg:deb/debian/samba@2:4.5.8%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.5.8%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.5.8%252Bdfsg-2%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2017-7494
risk_score 10.0
exploitability 2.0
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a653-r4dy-bba9
66
url VCID-anm7-p2rm-bqhm
vulnerability_id VCID-anm7-p2rm-bqhm
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which may allow execution of arbitrary code with root privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2948.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2948.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-2948
reference_id
reference_type
scores
0
value 0.00211
scoring_system epss
scoring_elements 0.43533
published_at 2026-04-01T12:55:00Z
1
value 0.00211
scoring_system epss
scoring_elements 0.43596
published_at 2026-04-02T12:55:00Z
2
value 0.00211
scoring_system epss
scoring_elements 0.43623
published_at 2026-04-04T12:55:00Z
3
value 0.00211
scoring_system epss
scoring_elements 0.4356
published_at 2026-04-07T12:55:00Z
4
value 0.00211
scoring_system epss
scoring_elements 0.43611
published_at 2026-04-08T12:55:00Z
5
value 0.00211
scoring_system epss
scoring_elements 0.43615
published_at 2026-04-09T12:55:00Z
6
value 0.00211
scoring_system epss
scoring_elements 0.43634
published_at 2026-04-11T12:55:00Z
7
value 0.00211
scoring_system epss
scoring_elements 0.43603
published_at 2026-04-12T12:55:00Z
8
value 0.00211
scoring_system epss
scoring_elements 0.43586
published_at 2026-04-13T12:55:00Z
9
value 0.00211
scoring_system epss
scoring_elements 0.43647
published_at 2026-04-16T12:55:00Z
10
value 0.00211
scoring_system epss
scoring_elements 0.43637
published_at 2026-04-18T12:55:00Z
11
value 0.00211
scoring_system epss
scoring_elements 0.43572
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-2948
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2948
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2948
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=526074
reference_id 526074
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=526074
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=550423
reference_id 550423
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=550423
5
reference_url https://security.gentoo.org/glsa/201206-22
reference_id GLSA-201206-22
reference_type
scores
url https://security.gentoo.org/glsa/201206-22
6
reference_url https://access.redhat.com/errata/RHSA-2009:1529
reference_id RHSA-2009:1529
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1529
7
reference_url https://access.redhat.com/errata/RHSA-2009:1585
reference_id RHSA-2009:1585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1585
8
reference_url https://usn.ubuntu.com/839-1/
reference_id USN-839-1
reference_type
scores
url https://usn.ubuntu.com/839-1/
fixed_packages
0
url pkg:deb/debian/samba@2:3.4.2-1?distro=trixie
purl pkg:deb/debian/samba@2:3.4.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:3.4.2-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2009-2948
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-anm7-p2rm-bqhm
67
url VCID-apqw-e2px-yka5
vulnerability_id VCID-apqw-e2px-yka5
summary Multiple vulnerabilities have been discovered in Samba, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14628.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14628.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-14628
reference_id
reference_type
scores
0
value 0.00502
scoring_system epss
scoring_elements 0.65978
published_at 2026-04-01T12:55:00Z
1
value 0.00502
scoring_system epss
scoring_elements 0.6602
published_at 2026-04-02T12:55:00Z
2
value 0.00502
scoring_system epss
scoring_elements 0.66049
published_at 2026-04-04T12:55:00Z
3
value 0.00502
scoring_system epss
scoring_elements 0.66016
published_at 2026-04-07T12:55:00Z
4
value 0.00502
scoring_system epss
scoring_elements 0.66065
published_at 2026-04-08T12:55:00Z
5
value 0.00502
scoring_system epss
scoring_elements 0.66078
published_at 2026-04-09T12:55:00Z
6
value 0.00502
scoring_system epss
scoring_elements 0.66097
published_at 2026-04-11T12:55:00Z
7
value 0.00502
scoring_system epss
scoring_elements 0.66084
published_at 2026-04-12T12:55:00Z
8
value 0.00502
scoring_system epss
scoring_elements 0.66054
published_at 2026-04-13T12:55:00Z
9
value 0.00502
scoring_system epss
scoring_elements 0.66089
published_at 2026-04-16T12:55:00Z
10
value 0.00502
scoring_system epss
scoring_elements 0.66104
published_at 2026-04-18T12:55:00Z
11
value 0.00502
scoring_system epss
scoring_elements 0.66091
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-14628
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14628
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034803
reference_id 1034803
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034803
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1625445
reference_id 1625445
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1625445
6
reference_url https://security.gentoo.org/glsa/202402-28
reference_id GLSA-202402-28
reference_type
scores
url https://security.gentoo.org/glsa/202402-28
fixed_packages
0
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.19.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.19.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.19.3%252Bdfsg-1%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2018-14628
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-apqw-e2px-yka5
68
url VCID-b4ty-d775-5fed
vulnerability_id VCID-b4ty-d775-5fed
summary Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1615.json
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1615.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1615
reference_id
reference_type
scores
0
value 0.00267
scoring_system epss
scoring_elements 0.50175
published_at 2026-04-21T12:55:00Z
1
value 0.00285
scoring_system epss
scoring_elements 0.51872
published_at 2026-04-01T12:55:00Z
2
value 0.00285
scoring_system epss
scoring_elements 0.5192
published_at 2026-04-02T12:55:00Z
3
value 0.00285
scoring_system epss
scoring_elements 0.51947
published_at 2026-04-04T12:55:00Z
4
value 0.00285
scoring_system epss
scoring_elements 0.51911
published_at 2026-04-07T12:55:00Z
5
value 0.00285
scoring_system epss
scoring_elements 0.51965
published_at 2026-04-08T12:55:00Z
6
value 0.00285
scoring_system epss
scoring_elements 0.51964
published_at 2026-04-09T12:55:00Z
7
value 0.00285
scoring_system epss
scoring_elements 0.52015
published_at 2026-04-11T12:55:00Z
8
value 0.00285
scoring_system epss
scoring_elements 0.51998
published_at 2026-04-12T12:55:00Z
9
value 0.00285
scoring_system epss
scoring_elements 0.51982
published_at 2026-04-13T12:55:00Z
10
value 0.00285
scoring_system epss
scoring_elements 0.52024
published_at 2026-04-16T12:55:00Z
11
value 0.00285
scoring_system epss
scoring_elements 0.5203
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1615
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1615
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021024
reference_id 1021024
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021024
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2122649
reference_id 2122649
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2122649
6
reference_url https://security.gentoo.org/glsa/202309-06
reference_id GLSA-202309-06
reference_type
scores
url https://security.gentoo.org/glsa/202309-06
7
reference_url https://access.redhat.com/errata/RHSA-2023:2519
reference_id RHSA-2023:2519
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2519
8
reference_url https://access.redhat.com/errata/RHSA-2023:2987
reference_id RHSA-2023:2987
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2987
9
reference_url https://access.redhat.com/errata/RHSA-2024:0423
reference_id RHSA-2024:0423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0423
fixed_packages
0
url pkg:deb/debian/samba@2:4.16.5%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.16.5%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.16.5%252Bdfsg-2%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2022-1615
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b4ty-d775-5fed
69
url VCID-bc1t-hzu5-bffd
vulnerability_id VCID-bc1t-hzu5-bffd
summary Multiple vulnerabilities have been discovered in Heimdal, the worst of which could lead to remote code execution on a KDC.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-44640
reference_id
reference_type
scores
0
value 0.01189
scoring_system epss
scoring_elements 0.78838
published_at 2026-04-21T12:55:00Z
1
value 0.01189
scoring_system epss
scoring_elements 0.78841
published_at 2026-04-11T12:55:00Z
2
value 0.01189
scoring_system epss
scoring_elements 0.78824
published_at 2026-04-12T12:55:00Z
3
value 0.01189
scoring_system epss
scoring_elements 0.78815
published_at 2026-04-13T12:55:00Z
4
value 0.01189
scoring_system epss
scoring_elements 0.78843
published_at 2026-04-16T12:55:00Z
5
value 0.01189
scoring_system epss
scoring_elements 0.7884
published_at 2026-04-18T12:55:00Z
6
value 0.01189
scoring_system epss
scoring_elements 0.78771
published_at 2026-04-02T12:55:00Z
7
value 0.01189
scoring_system epss
scoring_elements 0.78803
published_at 2026-04-04T12:55:00Z
8
value 0.01189
scoring_system epss
scoring_elements 0.78785
published_at 2026-04-07T12:55:00Z
9
value 0.01189
scoring_system epss
scoring_elements 0.7881
published_at 2026-04-08T12:55:00Z
10
value 0.01189
scoring_system epss
scoring_elements 0.78818
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-44640
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187
reference_id 1024187
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187
8
reference_url https://github.com/heimdal/heimdal/security/advisories/GHSA-88pm-hfmq-7vv4
reference_id GHSA-88pm-hfmq-7vv4
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T13:20:08Z/
url https://github.com/heimdal/heimdal/security/advisories/GHSA-88pm-hfmq-7vv4
9
reference_url https://security.gentoo.org/glsa/202310-06
reference_id GLSA-202310-06
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T13:20:08Z/
url https://security.gentoo.org/glsa/202310-06
10
reference_url https://security.netapp.com/advisory/ntap-20230216-0008/
reference_id ntap-20230216-0008
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T13:20:08Z/
url https://security.netapp.com/advisory/ntap-20230216-0008/
11
reference_url https://usn.ubuntu.com/5800-1/
reference_id USN-5800-1
reference_type
scores
url https://usn.ubuntu.com/5800-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.17.4%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.17.4%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.4%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2022-44640
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bc1t-hzu5-bffd
70
url VCID-bpht-9daq-rfgd
vulnerability_id VCID-bpht-9daq-rfgd
summary Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0922.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0922.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0922
reference_id
reference_type
scores
0
value 0.00229
scoring_system epss
scoring_elements 0.45679
published_at 2026-04-02T12:55:00Z
1
value 0.00229
scoring_system epss
scoring_elements 0.45744
published_at 2026-04-18T12:55:00Z
2
value 0.00229
scoring_system epss
scoring_elements 0.45749
published_at 2026-04-16T12:55:00Z
3
value 0.00229
scoring_system epss
scoring_elements 0.457
published_at 2026-04-13T12:55:00Z
4
value 0.00229
scoring_system epss
scoring_elements 0.45692
published_at 2026-04-12T12:55:00Z
5
value 0.00229
scoring_system epss
scoring_elements 0.45722
published_at 2026-04-11T12:55:00Z
6
value 0.00229
scoring_system epss
scoring_elements 0.45703
published_at 2026-04-08T12:55:00Z
7
value 0.00229
scoring_system epss
scoring_elements 0.45699
published_at 2026-04-09T12:55:00Z
8
value 0.00229
scoring_system epss
scoring_elements 0.45647
published_at 2026-04-07T12:55:00Z
9
value 0.00266
scoring_system epss
scoring_elements 0.50098
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0922
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0922
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2182774
reference_id 2182774
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2182774
5
reference_url https://www.samba.org/samba/security/CVE-2023-0922.html
reference_id CVE-2023-0922.html
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T14:54:28Z/
url https://www.samba.org/samba/security/CVE-2023-0922.html
6
reference_url https://security.gentoo.org/glsa/202309-06
reference_id GLSA-202309-06
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T14:54:28Z/
url https://security.gentoo.org/glsa/202309-06
7
reference_url https://security.netapp.com/advisory/ntap-20230406-0007/
reference_id ntap-20230406-0007
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T14:54:28Z/
url https://security.netapp.com/advisory/ntap-20230406-0007/
8
reference_url https://usn.ubuntu.com/5993-1/
reference_id USN-5993-1
reference_type
scores
url https://usn.ubuntu.com/5993-1/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YXBPYIA4VWNOD437NAHZ3NXKAETLFB5S/
reference_id YXBPYIA4VWNOD437NAHZ3NXKAETLFB5S
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T14:54:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YXBPYIA4VWNOD437NAHZ3NXKAETLFB5S/
fixed_packages
0
url pkg:deb/debian/samba@2:4.17.7%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.17.7%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.7%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2023-0922
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bpht-9daq-rfgd
71
url VCID-c9k2-wjf4-gbg6
vulnerability_id VCID-c9k2-wjf4-gbg6
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which may allow execution of arbitrary code with root privileges.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8467.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8467.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8467
reference_id
reference_type
scores
0
value 0.01749
scoring_system epss
scoring_elements 0.82588
published_at 2026-04-21T12:55:00Z
1
value 0.01749
scoring_system epss
scoring_elements 0.82584
published_at 2026-04-18T12:55:00Z
2
value 0.01749
scoring_system epss
scoring_elements 0.82476
published_at 2026-04-01T12:55:00Z
3
value 0.01749
scoring_system epss
scoring_elements 0.8249
published_at 2026-04-02T12:55:00Z
4
value 0.01749
scoring_system epss
scoring_elements 0.82508
published_at 2026-04-04T12:55:00Z
5
value 0.01749
scoring_system epss
scoring_elements 0.82505
published_at 2026-04-07T12:55:00Z
6
value 0.01749
scoring_system epss
scoring_elements 0.82531
published_at 2026-04-08T12:55:00Z
7
value 0.01749
scoring_system epss
scoring_elements 0.82538
published_at 2026-04-09T12:55:00Z
8
value 0.01749
scoring_system epss
scoring_elements 0.82557
published_at 2026-04-11T12:55:00Z
9
value 0.01749
scoring_system epss
scoring_elements 0.82552
published_at 2026-04-12T12:55:00Z
10
value 0.01749
scoring_system epss
scoring_elements 0.82547
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8467
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3223
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3223
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5252
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5252
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5330
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5330
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7540
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7540
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8467
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8467
14
reference_url https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=b000da128b5fb519d2d3f2e7fd20e4a25b7dae7d
reference_id
reference_type
scores
url https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=b000da128b5fb519d2d3f2e7fd20e4a25b7dae7d
15
reference_url https://www.samba.org/samba/security/CVE-2015-8467.html
reference_id
reference_type
scores
url https://www.samba.org/samba/security/CVE-2015-8467.html
16
reference_url http://www.debian.org/security/2016/dsa-3433
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3433
17
reference_url http://www.securityfocus.com/bid/79735
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79735
18
reference_url http://www.securitytracker.com/id/1034493
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034493
19
reference_url http://www.ubuntu.com/usn/USN-2855-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2855-1
20
reference_url http://www.ubuntu.com/usn/USN-2855-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2855-2
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1290294
reference_id 1290294
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1290294
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8467
reference_id CVE-2015-8467
reference_type
scores
0
value 6.0
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:P/A:P
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-8467
30
reference_url https://security.gentoo.org/glsa/201612-47
reference_id GLSA-201612-47
reference_type
scores
url https://security.gentoo.org/glsa/201612-47
31
reference_url https://usn.ubuntu.com/2855-1/
reference_id USN-2855-1
reference_type
scores
url https://usn.ubuntu.com/2855-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.1.22%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.1.22%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.1.22%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2015-8467
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c9k2-wjf4-gbg6
72
url VCID-ce1t-wb2k-2uct
vulnerability_id VCID-ce1t-wb2k-2uct
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00035.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00035.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3824.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3824.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-3824
reference_id
reference_type
scores
0
value 0.11794
scoring_system epss
scoring_elements 0.93671
published_at 2026-04-01T12:55:00Z
1
value 0.11794
scoring_system epss
scoring_elements 0.93737
published_at 2026-04-21T12:55:00Z
2
value 0.11794
scoring_system epss
scoring_elements 0.93711
published_at 2026-04-13T12:55:00Z
3
value 0.11794
scoring_system epss
scoring_elements 0.93728
published_at 2026-04-16T12:55:00Z
4
value 0.11794
scoring_system epss
scoring_elements 0.93734
published_at 2026-04-18T12:55:00Z
5
value 0.11794
scoring_system epss
scoring_elements 0.93681
published_at 2026-04-02T12:55:00Z
6
value 0.11794
scoring_system epss
scoring_elements 0.93692
published_at 2026-04-04T12:55:00Z
7
value 0.11794
scoring_system epss
scoring_elements 0.93694
published_at 2026-04-07T12:55:00Z
8
value 0.11794
scoring_system epss
scoring_elements 0.93704
published_at 2026-04-08T12:55:00Z
9
value 0.11794
scoring_system epss
scoring_elements 0.93705
published_at 2026-04-09T12:55:00Z
10
value 0.11794
scoring_system epss
scoring_elements 0.9371
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-3824
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3824
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3824
4
reference_url https://bugzilla.samba.org/show_bug.cgi?id=13773
reference_id
reference_type
scores
url https://bugzilla.samba.org/show_bug.cgi?id=13773
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3824
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://lists.debian.org/debian-lts-announce/2019/03/msg00000.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/03/msg00000.html
8
reference_url https://security.netapp.com/advisory/ntap-20190226-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190226-0001/
9
reference_url https://www.debian.org/security/2019/dsa-4397
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4397
10
reference_url http://www.securityfocus.com/bid/107347
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/107347
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1671845
reference_id 1671845
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1671845
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-3824
reference_id CVE-2019-3824
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-3824
19
reference_url https://usn.ubuntu.com/3895-1/
reference_id USN-3895-1
reference_type
scores
url https://usn.ubuntu.com/3895-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.9.5%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.9.5%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2019-3824
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ce1t-wb2k-2uct
73
url VCID-cgez-urtv-qbhq
vulnerability_id VCID-cgez-urtv-qbhq
summary Multiple vulnerabilities have been discovered in Samba, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34967.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34967.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-34967
reference_id
reference_type
scores
0
value 0.18271
scoring_system epss
scoring_elements 0.95222
published_at 2026-04-21T12:55:00Z
1
value 0.21174
scoring_system epss
scoring_elements 0.95637
published_at 2026-04-02T12:55:00Z
2
value 0.21174
scoring_system epss
scoring_elements 0.95642
published_at 2026-04-04T12:55:00Z
3
value 0.21174
scoring_system epss
scoring_elements 0.95645
published_at 2026-04-07T12:55:00Z
4
value 0.21174
scoring_system epss
scoring_elements 0.95653
published_at 2026-04-08T12:55:00Z
5
value 0.21174
scoring_system epss
scoring_elements 0.95657
published_at 2026-04-09T12:55:00Z
6
value 0.21174
scoring_system epss
scoring_elements 0.95662
published_at 2026-04-11T12:55:00Z
7
value 0.21174
scoring_system epss
scoring_elements 0.95661
published_at 2026-04-12T12:55:00Z
8
value 0.21174
scoring_system epss
scoring_elements 0.95664
published_at 2026-04-13T12:55:00Z
9
value 0.21174
scoring_system epss
scoring_elements 0.95672
published_at 2026-04-16T12:55:00Z
10
value 0.21174
scoring_system epss
scoring_elements 0.95676
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-34967
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2222794
reference_id 2222794
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2222794
10
reference_url https://security.gentoo.org/glsa/202402-28
reference_id GLSA-202402-28
reference_type
scores
url https://security.gentoo.org/glsa/202402-28
11
reference_url https://access.redhat.com/errata/RHSA-2023:6667
reference_id RHSA-2023:6667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6667
12
reference_url https://access.redhat.com/errata/RHSA-2023:7139
reference_id RHSA-2023:7139
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7139
13
reference_url https://access.redhat.com/errata/RHSA-2024:0423
reference_id RHSA-2024:0423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0423
14
reference_url https://access.redhat.com/errata/RHSA-2024:0580
reference_id RHSA-2024:0580
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0580
15
reference_url https://usn.ubuntu.com/6238-1/
reference_id USN-6238-1
reference_type
scores
url https://usn.ubuntu.com/6238-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.17.10%2Bdfsg-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/samba@2:4.17.10%2Bdfsg-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.10%252Bdfsg-0%252Bdeb12u1%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.18.5%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.18.5%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.18.5%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
6
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2023-34967
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cgez-urtv-qbhq
74
url VCID-chw1-z5pp-53h4
vulnerability_id VCID-chw1-z5pp-53h4
summary smbmnt in Samba 2.x and 3.x on Linux 2.6, when installed setuid, allows local users to gain root privileges by mounting a Samba share that contains a setuid root program, whose setuid attributes are not cleared when the share is mounted.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0186
reference_id
reference_type
scores
0
value 0.00525
scoring_system epss
scoring_elements 0.6691
published_at 2026-04-01T12:55:00Z
1
value 0.00525
scoring_system epss
scoring_elements 0.66948
published_at 2026-04-07T12:55:00Z
2
value 0.00525
scoring_system epss
scoring_elements 0.66974
published_at 2026-04-04T12:55:00Z
3
value 0.00525
scoring_system epss
scoring_elements 0.66997
published_at 2026-04-08T12:55:00Z
4
value 0.00525
scoring_system epss
scoring_elements 0.6701
published_at 2026-04-09T12:55:00Z
5
value 0.00525
scoring_system epss
scoring_elements 0.6703
published_at 2026-04-11T12:55:00Z
6
value 0.00525
scoring_system epss
scoring_elements 0.67015
published_at 2026-04-12T12:55:00Z
7
value 0.00525
scoring_system epss
scoring_elements 0.66985
published_at 2026-04-13T12:55:00Z
8
value 0.00525
scoring_system epss
scoring_elements 0.67018
published_at 2026-04-16T12:55:00Z
9
value 0.00525
scoring_system epss
scoring_elements 0.67032
published_at 2026-04-18T12:55:00Z
10
value 0.00525
scoring_system epss
scoring_elements 0.67013
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0186
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0186
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0186
2
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/23674.txt
reference_id CVE-2004-0186;OSVDB-3916
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/23674.txt
3
reference_url https://www.securityfocus.com/bid/9619/info
reference_id CVE-2004-0186;OSVDB-3916
reference_type exploit
scores
url https://www.securityfocus.com/bid/9619/info
fixed_packages
0
url pkg:deb/debian/samba@3.0.2-2?distro=trixie
purl pkg:deb/debian/samba@3.0.2-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@3.0.2-2%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2004-0186
risk_score null
exploitability 2.0
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-chw1-z5pp-53h4
75
url VCID-chw6-82ck-huhg
vulnerability_id VCID-chw6-82ck-huhg
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which allowing a context-dependent attacker to bypass intended file
    restrictions, cause a Denial of Service or execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4476.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4476.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4476
reference_id
reference_type
scores
0
value 0.00226
scoring_system epss
scoring_elements 0.4525
published_at 2026-04-01T12:55:00Z
1
value 0.00226
scoring_system epss
scoring_elements 0.45332
published_at 2026-04-02T12:55:00Z
2
value 0.00226
scoring_system epss
scoring_elements 0.45352
published_at 2026-04-04T12:55:00Z
3
value 0.00226
scoring_system epss
scoring_elements 0.45296
published_at 2026-04-07T12:55:00Z
4
value 0.00226
scoring_system epss
scoring_elements 0.45351
published_at 2026-04-09T12:55:00Z
5
value 0.00226
scoring_system epss
scoring_elements 0.45373
published_at 2026-04-11T12:55:00Z
6
value 0.00226
scoring_system epss
scoring_elements 0.45341
published_at 2026-04-12T12:55:00Z
7
value 0.00226
scoring_system epss
scoring_elements 0.45342
published_at 2026-04-13T12:55:00Z
8
value 0.00226
scoring_system epss
scoring_elements 0.45394
published_at 2026-04-16T12:55:00Z
9
value 0.00226
scoring_system epss
scoring_elements 0.45389
published_at 2026-04-18T12:55:00Z
10
value 0.00226
scoring_system epss
scoring_elements 0.45339
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4476
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4476
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1024547
reference_id 1024547
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1024547
4
reference_url https://security.gentoo.org/glsa/201502-15
reference_id GLSA-201502-15
reference_type
scores
url https://security.gentoo.org/glsa/201502-15
fixed_packages
0
url pkg:deb/debian/samba@2:4.0.11%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.0.11%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.0.11%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2013-4476
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-chw6-82ck-huhg
76
url VCID-cjqf-muwp-3qbq
vulnerability_id VCID-cjqf-muwp-3qbq
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14629.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14629.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-14629
reference_id
reference_type
scores
0
value 0.09242
scoring_system epss
scoring_elements 0.92692
published_at 2026-04-01T12:55:00Z
1
value 0.09242
scoring_system epss
scoring_elements 0.92738
published_at 2026-04-21T12:55:00Z
2
value 0.09242
scoring_system epss
scoring_elements 0.92723
published_at 2026-04-13T12:55:00Z
3
value 0.09242
scoring_system epss
scoring_elements 0.92734
published_at 2026-04-18T12:55:00Z
4
value 0.09242
scoring_system epss
scoring_elements 0.92699
published_at 2026-04-02T12:55:00Z
5
value 0.09242
scoring_system epss
scoring_elements 0.92705
published_at 2026-04-04T12:55:00Z
6
value 0.09242
scoring_system epss
scoring_elements 0.92704
published_at 2026-04-07T12:55:00Z
7
value 0.09242
scoring_system epss
scoring_elements 0.92714
published_at 2026-04-08T12:55:00Z
8
value 0.09242
scoring_system epss
scoring_elements 0.92718
published_at 2026-04-09T12:55:00Z
9
value 0.09242
scoring_system epss
scoring_elements 0.92724
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-14629
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14629
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16841
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16841
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16851
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1625449
reference_id 1625449
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1625449
7
reference_url https://security.archlinux.org/ASA-201811-22
reference_id ASA-201811-22
reference_type
scores
url https://security.archlinux.org/ASA-201811-22
8
reference_url https://security.archlinux.org/AVG-823
reference_id AVG-823
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-823
9
reference_url https://security.gentoo.org/glsa/202003-52
reference_id GLSA-202003-52
reference_type
scores
url https://security.gentoo.org/glsa/202003-52
10
reference_url https://usn.ubuntu.com/3827-1/
reference_id USN-3827-1
reference_type
scores
url https://usn.ubuntu.com/3827-1/
11
reference_url https://usn.ubuntu.com/3827-2/
reference_id USN-3827-2
reference_type
scores
url https://usn.ubuntu.com/3827-2/
fixed_packages
0
url pkg:deb/debian/samba@2:4.9.2%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.9.2%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.2%252Bdfsg-2%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2018-14629
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cjqf-muwp-3qbq
77
url VCID-crh2-zv3e-pfaa
vulnerability_id VCID-crh2-zv3e-pfaa
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14907.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14907.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-14907
reference_id
reference_type
scores
0
value 0.10242
scoring_system epss
scoring_elements 0.93119
published_at 2026-04-01T12:55:00Z
1
value 0.10242
scoring_system epss
scoring_elements 0.93129
published_at 2026-04-02T12:55:00Z
2
value 0.10242
scoring_system epss
scoring_elements 0.93132
published_at 2026-04-04T12:55:00Z
3
value 0.10242
scoring_system epss
scoring_elements 0.93131
published_at 2026-04-07T12:55:00Z
4
value 0.10242
scoring_system epss
scoring_elements 0.9314
published_at 2026-04-08T12:55:00Z
5
value 0.10242
scoring_system epss
scoring_elements 0.93144
published_at 2026-04-09T12:55:00Z
6
value 0.10242
scoring_system epss
scoring_elements 0.9315
published_at 2026-04-11T12:55:00Z
7
value 0.10242
scoring_system epss
scoring_elements 0.93147
published_at 2026-04-12T12:55:00Z
8
value 0.10242
scoring_system epss
scoring_elements 0.93148
published_at 2026-04-13T12:55:00Z
9
value 0.10242
scoring_system epss
scoring_elements 0.93165
published_at 2026-04-16T12:55:00Z
10
value 0.10242
scoring_system epss
scoring_elements 0.93169
published_at 2026-04-18T12:55:00Z
11
value 0.10242
scoring_system epss
scoring_elements 0.93177
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-14907
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14907
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14907
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1791207
reference_id 1791207
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1791207
5
reference_url https://security.gentoo.org/glsa/202003-52
reference_id GLSA-202003-52
reference_type
scores
url https://security.gentoo.org/glsa/202003-52
6
reference_url https://access.redhat.com/errata/RHSA-2020:0943
reference_id RHSA-2020:0943
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0943
7
reference_url https://access.redhat.com/errata/RHSA-2020:1878
reference_id RHSA-2020:1878
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1878
8
reference_url https://access.redhat.com/errata/RHSA-2020:3981
reference_id RHSA-2020:3981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3981
9
reference_url https://usn.ubuntu.com/4244-1/
reference_id USN-4244-1
reference_type
scores
url https://usn.ubuntu.com/4244-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.11.5%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.11.5%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.11.5%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2019-14907
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-crh2-zv3e-pfaa
78
url VCID-cszj-r962-3yd8
vulnerability_id VCID-cszj-r962-3yd8
summary Multiple vulnerabilities have been discovered in Samba, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42670.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42670.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42670
reference_id
reference_type
scores
0
value 0.00385
scoring_system epss
scoring_elements 0.59782
published_at 2026-04-21T12:55:00Z
1
value 0.00385
scoring_system epss
scoring_elements 0.59709
published_at 2026-04-02T12:55:00Z
2
value 0.00385
scoring_system epss
scoring_elements 0.59703
published_at 2026-04-07T12:55:00Z
3
value 0.00385
scoring_system epss
scoring_elements 0.59754
published_at 2026-04-13T12:55:00Z
4
value 0.00385
scoring_system epss
scoring_elements 0.59768
published_at 2026-04-09T12:55:00Z
5
value 0.00385
scoring_system epss
scoring_elements 0.59787
published_at 2026-04-11T12:55:00Z
6
value 0.00385
scoring_system epss
scoring_elements 0.59772
published_at 2026-04-12T12:55:00Z
7
value 0.00385
scoring_system epss
scoring_elements 0.59791
published_at 2026-04-16T12:55:00Z
8
value 0.00385
scoring_system epss
scoring_elements 0.59797
published_at 2026-04-18T12:55:00Z
9
value 0.00385
scoring_system epss
scoring_elements 0.59733
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42670
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2241885
reference_id 2241885
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-29T14:14:50Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2241885
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:storage:3
reference_id cpe:/a:redhat:storage:3
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:storage:3
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
9
reference_url https://access.redhat.com/security/cve/CVE-2023-42670
reference_id CVE-2023-42670
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-29T14:14:50Z/
url https://access.redhat.com/security/cve/CVE-2023-42670
10
reference_url https://www.samba.org/samba/security/CVE-2023-42670.html
reference_id CVE-2023-42670.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-29T14:14:50Z/
url https://www.samba.org/samba/security/CVE-2023-42670.html
11
reference_url https://security.gentoo.org/glsa/202402-28
reference_id GLSA-202402-28
reference_type
scores
url https://security.gentoo.org/glsa/202402-28
12
reference_url https://bugzilla.samba.org/show_bug.cgi?id=15473
reference_id show_bug.cgi?id=15473
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-29T14:14:50Z/
url https://bugzilla.samba.org/show_bug.cgi?id=15473
13
reference_url https://usn.ubuntu.com/6425-1/
reference_id USN-6425-1
reference_type
scores
url https://usn.ubuntu.com/6425-1/
14
reference_url https://usn.ubuntu.com/6425-3/
reference_id USN-6425-3
reference_type
scores
url https://usn.ubuntu.com/6425-3/
fixed_packages
0
url pkg:deb/debian/samba@0?distro=trixie
purl pkg:deb/debian/samba@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@0%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.19.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.19.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.19.1%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
7
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2023-42670
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cszj-r962-3yd8
79
url VCID-cu61-u4g4-kka7
vulnerability_id VCID-cu61-u4g4-kka7
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which allowing a context-dependent attacker to bypass intended file
    restrictions, cause a Denial of Service or execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4124.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4124.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4124
reference_id
reference_type
scores
0
value 0.83531
scoring_system epss
scoring_elements 0.99274
published_at 2026-04-01T12:55:00Z
1
value 0.83531
scoring_system epss
scoring_elements 0.99275
published_at 2026-04-02T12:55:00Z
2
value 0.83531
scoring_system epss
scoring_elements 0.99278
published_at 2026-04-04T12:55:00Z
3
value 0.83531
scoring_system epss
scoring_elements 0.99281
published_at 2026-04-07T12:55:00Z
4
value 0.83531
scoring_system epss
scoring_elements 0.99282
published_at 2026-04-09T12:55:00Z
5
value 0.83531
scoring_system epss
scoring_elements 0.99283
published_at 2026-04-13T12:55:00Z
6
value 0.83531
scoring_system epss
scoring_elements 0.99284
published_at 2026-04-21T12:55:00Z
7
value 0.83531
scoring_system epss
scoring_elements 0.99285
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4124
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4124
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=984401
reference_id 984401
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=984401
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/27778.txt
reference_id CVE-2013-4124;OSVDB-95969
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/27778.txt
5
reference_url https://security.gentoo.org/glsa/201502-15
reference_id GLSA-201502-15
reference_type
scores
url https://security.gentoo.org/glsa/201502-15
6
reference_url https://access.redhat.com/errata/RHSA-2013:1310
reference_id RHSA-2013:1310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1310
7
reference_url https://access.redhat.com/errata/RHSA-2013:1542
reference_id RHSA-2013:1542
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1542
8
reference_url https://access.redhat.com/errata/RHSA-2013:1543
reference_id RHSA-2013:1543
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1543
9
reference_url https://access.redhat.com/errata/RHSA-2014:0305
reference_id RHSA-2014:0305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0305
10
reference_url https://usn.ubuntu.com/1966-1/
reference_id USN-1966-1
reference_type
scores
url https://usn.ubuntu.com/1966-1/
fixed_packages
0
url pkg:deb/debian/samba@2:3.6.17-1?distro=trixie
purl pkg:deb/debian/samba@2:3.6.17-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:3.6.17-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2013-4124
risk_score 1.6
exploitability 2.0
weighted_severity 0.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cu61-u4g4-kka7
80
url VCID-cuww-r4gf-7ubd
vulnerability_id VCID-cuww-r4gf-7ubd
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0196.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0196.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2003-0196
reference_id
reference_type
scores
0
value 0.05111
scoring_system epss
scoring_elements 0.89802
published_at 2026-04-01T12:55:00Z
1
value 0.05111
scoring_system epss
scoring_elements 0.89805
published_at 2026-04-02T12:55:00Z
2
value 0.05111
scoring_system epss
scoring_elements 0.89819
published_at 2026-04-04T12:55:00Z
3
value 0.05111
scoring_system epss
scoring_elements 0.89823
published_at 2026-04-07T12:55:00Z
4
value 0.05111
scoring_system epss
scoring_elements 0.8984
published_at 2026-04-08T12:55:00Z
5
value 0.05111
scoring_system epss
scoring_elements 0.89846
published_at 2026-04-09T12:55:00Z
6
value 0.05111
scoring_system epss
scoring_elements 0.89853
published_at 2026-04-11T12:55:00Z
7
value 0.05111
scoring_system epss
scoring_elements 0.89851
published_at 2026-04-21T12:55:00Z
8
value 0.05111
scoring_system epss
scoring_elements 0.89844
published_at 2026-04-13T12:55:00Z
9
value 0.05111
scoring_system epss
scoring_elements 0.89857
published_at 2026-04-16T12:55:00Z
10
value 0.05111
scoring_system epss
scoring_elements 0.89858
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2003-0196
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0196
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617001
reference_id 1617001
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617001
4
reference_url https://access.redhat.com/errata/RHSA-2003:137
reference_id RHSA-2003:137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:137
5
reference_url https://access.redhat.com/errata/RHSA-2003:138
reference_id RHSA-2003:138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:138
6
reference_url https://access.redhat.com/errata/RHSA-2003:226
reference_id RHSA-2003:226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:226
fixed_packages
0
url pkg:deb/debian/samba@3.0?distro=trixie
purl pkg:deb/debian/samba@3.0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@3.0%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2003-0196
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cuww-r4gf-7ubd
81
url VCID-dm1n-xtju-1qgr
vulnerability_id VCID-dm1n-xtju-1qgr
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which may allow execution of arbitrary code with root privileges.
references
0
reference_url http://git.samba.org/?p=samba.git%3Ba=commit%3Bh=25452a2268ac7013da28125f3df22085139af12d
reference_id
reference_type
scores
url http://git.samba.org/?p=samba.git%3Ba=commit%3Bh=25452a2268ac7013da28125f3df22085139af12d
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1635.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1635.json
2
reference_url http://samba.org/samba/history/samba-3.4.8.html
reference_id
reference_type
scores
url http://samba.org/samba/history/samba-3.4.8.html
3
reference_url http://samba.org/samba/history/samba-3.5.2.html
reference_id
reference_type
scores
url http://samba.org/samba/history/samba-3.5.2.html
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-1635
reference_id
reference_type
scores
0
value 0.12656
scoring_system epss
scoring_elements 0.94
published_at 2026-04-21T12:55:00Z
1
value 0.12656
scoring_system epss
scoring_elements 0.93942
published_at 2026-04-01T12:55:00Z
2
value 0.12656
scoring_system epss
scoring_elements 0.93951
published_at 2026-04-02T12:55:00Z
3
value 0.12656
scoring_system epss
scoring_elements 0.9396
published_at 2026-04-04T12:55:00Z
4
value 0.12656
scoring_system epss
scoring_elements 0.93963
published_at 2026-04-07T12:55:00Z
5
value 0.12656
scoring_system epss
scoring_elements 0.93971
published_at 2026-04-08T12:55:00Z
6
value 0.12656
scoring_system epss
scoring_elements 0.93974
published_at 2026-04-09T12:55:00Z
7
value 0.12656
scoring_system epss
scoring_elements 0.93978
published_at 2026-04-13T12:55:00Z
8
value 0.12656
scoring_system epss
scoring_elements 0.93993
published_at 2026-04-16T12:55:00Z
9
value 0.12656
scoring_system epss
scoring_elements 0.93999
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-1635
5
reference_url https://bugzilla.samba.org/show_bug.cgi?id=7229
reference_id
reference_type
scores
url https://bugzilla.samba.org/show_bug.cgi?id=7229
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1635
7
reference_url http://security-tracker.debian.org/tracker/CVE-2010-1635
reference_id
reference_type
scores
url http://security-tracker.debian.org/tracker/CVE-2010-1635
8
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:141
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:141
9
reference_url http://www.securityfocus.com/bid/40097
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/40097
10
reference_url http://www.stratsec.net/Research/Advisories/Samba-Multiple-DoS-Vulnerabilities-%28SS-2010-005%29
reference_id
reference_type
scores
url http://www.stratsec.net/Research/Advisories/Samba-Multiple-DoS-Vulnerabilities-%28SS-2010-005%29
11
reference_url http://www.vupen.com/english/advisories/2010/1933
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1933
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=594921
reference_id 594921
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=594921
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.27a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27a:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.28a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28a:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.1.0:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5:*:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-1635
reference_id CVE-2010-1635
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-1635
118
reference_url https://security.gentoo.org/glsa/201206-22
reference_id GLSA-201206-22
reference_type
scores
url https://security.gentoo.org/glsa/201206-22
fixed_packages
0
url pkg:deb/debian/samba@2:3.6.1-2?distro=trixie
purl pkg:deb/debian/samba@2:3.6.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:3.6.1-2%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2010-1635
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dm1n-xtju-1qgr
82
url VCID-dzux-xe2s-fyhg
vulnerability_id VCID-dzux-xe2s-fyhg
summary samba: AD DC Denial of Service in DNS management server
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12435.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12435.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-12435
reference_id
reference_type
scores
0
value 0.0396
scoring_system epss
scoring_elements 0.88377
published_at 2026-04-21T12:55:00Z
1
value 0.0396
scoring_system epss
scoring_elements 0.88373
published_at 2026-04-11T12:55:00Z
2
value 0.0396
scoring_system epss
scoring_elements 0.88365
published_at 2026-04-13T12:55:00Z
3
value 0.0396
scoring_system epss
scoring_elements 0.8838
published_at 2026-04-16T12:55:00Z
4
value 0.0396
scoring_system epss
scoring_elements 0.88332
published_at 2026-04-04T12:55:00Z
5
value 0.0396
scoring_system epss
scoring_elements 0.88337
published_at 2026-04-07T12:55:00Z
6
value 0.0396
scoring_system epss
scoring_elements 0.88356
published_at 2026-04-08T12:55:00Z
7
value 0.0396
scoring_system epss
scoring_elements 0.88363
published_at 2026-04-09T12:55:00Z
8
value 0.04135
scoring_system epss
scoring_elements 0.88607
published_at 2026-04-02T12:55:00Z
9
value 0.04135
scoring_system epss
scoring_elements 0.88598
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-12435
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12435
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1711816
reference_id 1711816
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1711816
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930748
reference_id 930748
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930748
6
reference_url https://usn.ubuntu.com/4018-1/
reference_id USN-4018-1
reference_type
scores
url https://usn.ubuntu.com/4018-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.9.5%2Bdfsg-5?distro=trixie
purl pkg:deb/debian/samba@2:4.9.5%2Bdfsg-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-5%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2019-12435
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dzux-xe2s-fyhg
83
url VCID-e3gq-5a8s-akh4
vulnerability_id VCID-e3gq-5a8s-akh4
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00063.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00063.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0771.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0771.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0771
reference_id
reference_type
scores
0
value 0.05663
scoring_system epss
scoring_elements 0.9039
published_at 2026-04-21T12:55:00Z
1
value 0.05663
scoring_system epss
scoring_elements 0.90393
published_at 2026-04-18T12:55:00Z
2
value 0.05663
scoring_system epss
scoring_elements 0.90338
published_at 2026-04-01T12:55:00Z
3
value 0.05663
scoring_system epss
scoring_elements 0.90341
published_at 2026-04-02T12:55:00Z
4
value 0.05663
scoring_system epss
scoring_elements 0.90352
published_at 2026-04-04T12:55:00Z
5
value 0.05663
scoring_system epss
scoring_elements 0.90356
published_at 2026-04-07T12:55:00Z
6
value 0.05663
scoring_system epss
scoring_elements 0.9037
published_at 2026-04-08T12:55:00Z
7
value 0.05663
scoring_system epss
scoring_elements 0.90376
published_at 2026-04-09T12:55:00Z
8
value 0.05663
scoring_system epss
scoring_elements 0.90384
published_at 2026-04-12T12:55:00Z
9
value 0.05663
scoring_system epss
scoring_elements 0.90378
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0771
3
reference_url https://bugzilla.samba.org/show_bug.cgi?id=11128
reference_id
reference_type
scores
url https://bugzilla.samba.org/show_bug.cgi?id=11128
4
reference_url https://bugzilla.samba.org/show_bug.cgi?id=11686
reference_id
reference_type
scores
url https://bugzilla.samba.org/show_bug.cgi?id=11686
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7560
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7560
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0771
7
reference_url https://www.samba.org/samba/security/CVE-2016-0771.html
reference_id
reference_type
scores
url https://www.samba.org/samba/security/CVE-2016-0771.html
8
reference_url http://www.debian.org/security/2016/dsa-3514
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3514
9
reference_url http://www.securityfocus.com/bid/84273
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/84273
10
reference_url http://www.securitytracker.com/id/1035219
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035219
11
reference_url http://www.ubuntu.com/usn/USN-2922-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2922-1
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1309978
reference_id 1309978
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1309978
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.4.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:rc1:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.4.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:rc2:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.4.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:rc3:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0771
reference_id CVE-2016-0771
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:N/A:P
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-0771
83
reference_url https://usn.ubuntu.com/2922-1/
reference_id USN-2922-1
reference_type
scores
url https://usn.ubuntu.com/2922-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.3.6%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.3.6%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.3.6%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2016-0771
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e3gq-5a8s-akh4
84
url VCID-e44h-7rhe-tuau
vulnerability_id VCID-e44h-7rhe-tuau
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which may allow execution of arbitrary code with root privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2111.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2111.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-2111
reference_id
reference_type
scores
0
value 0.02255
scoring_system epss
scoring_elements 0.8452
published_at 2026-04-01T12:55:00Z
1
value 0.02255
scoring_system epss
scoring_elements 0.84535
published_at 2026-04-02T12:55:00Z
2
value 0.02255
scoring_system epss
scoring_elements 0.84556
published_at 2026-04-04T12:55:00Z
3
value 0.02255
scoring_system epss
scoring_elements 0.8456
published_at 2026-04-07T12:55:00Z
4
value 0.02255
scoring_system epss
scoring_elements 0.84582
published_at 2026-04-08T12:55:00Z
5
value 0.02255
scoring_system epss
scoring_elements 0.84588
published_at 2026-04-09T12:55:00Z
6
value 0.02255
scoring_system epss
scoring_elements 0.84607
published_at 2026-04-11T12:55:00Z
7
value 0.02255
scoring_system epss
scoring_elements 0.84602
published_at 2026-04-12T12:55:00Z
8
value 0.02255
scoring_system epss
scoring_elements 0.84598
published_at 2026-04-13T12:55:00Z
9
value 0.02255
scoring_system epss
scoring_elements 0.84618
published_at 2026-04-18T12:55:00Z
10
value 0.02255
scoring_system epss
scoring_elements 0.8462
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-2111
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2111
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=813569
reference_id 813569
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=813569
4
reference_url https://security.gentoo.org/glsa/201206-22
reference_id GLSA-201206-22
reference_type
scores
url https://security.gentoo.org/glsa/201206-22
5
reference_url https://access.redhat.com/errata/RHSA-2012:0533
reference_id RHSA-2012:0533
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0533
6
reference_url https://usn.ubuntu.com/1434-1/
reference_id USN-1434-1
reference_type
scores
url https://usn.ubuntu.com/1434-1/
fixed_packages
0
url pkg:deb/debian/samba@2:3.6.5-1?distro=trixie
purl pkg:deb/debian/samba@2:3.6.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:3.6.5-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-2111
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e44h-7rhe-tuau
85
url VCID-epm9-d1pw-j7cw
vulnerability_id VCID-epm9-d1pw-j7cw
summary samba: clickjacking vulnerability in SWAT
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00019.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00019.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00042.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00042.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2013-02/msg00029.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-02/msg00029.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2013-02/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-02/msg00033.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2013-1310.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1310.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2013-1542.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1542.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2014-0305.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-0305.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0213.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0213.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-0213
reference_id
reference_type
scores
0
value 0.11126
scoring_system epss
scoring_elements 0.93498
published_at 2026-04-21T12:55:00Z
1
value 0.11126
scoring_system epss
scoring_elements 0.93432
published_at 2026-04-01T12:55:00Z
2
value 0.11126
scoring_system epss
scoring_elements 0.9344
published_at 2026-04-02T12:55:00Z
3
value 0.11126
scoring_system epss
scoring_elements 0.93449
published_at 2026-04-04T12:55:00Z
4
value 0.11126
scoring_system epss
scoring_elements 0.9345
published_at 2026-04-07T12:55:00Z
5
value 0.11126
scoring_system epss
scoring_elements 0.93458
published_at 2026-04-08T12:55:00Z
6
value 0.11126
scoring_system epss
scoring_elements 0.93461
published_at 2026-04-09T12:55:00Z
7
value 0.11126
scoring_system epss
scoring_elements 0.93466
published_at 2026-04-12T12:55:00Z
8
value 0.11126
scoring_system epss
scoring_elements 0.93467
published_at 2026-04-13T12:55:00Z
9
value 0.11126
scoring_system epss
scoring_elements 0.93486
published_at 2026-04-16T12:55:00Z
10
value 0.11126
scoring_system epss
scoring_elements 0.93492
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-0213
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0213
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0213
10
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993
11
reference_url http://www.debian.org/security/2013/dsa-2617
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2617
12
reference_url http://www.samba.org/samba/security/CVE-2013-0213
reference_id
reference_type
scores
url http://www.samba.org/samba/security/CVE-2013-0213
13
reference_url http://www.securityfocus.com/bid/57631
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/57631
14
reference_url http://www.ubuntu.com/usn/USN-2922-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2922-1
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=905700
reference_id 905700
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=905700
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.1.0:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.15:*:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.16:*:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.12:*:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.13:*:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.14:*:*:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.15:*:*:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.16:*:*:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.17:*:*:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*
138
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*
139
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*
140
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*
141
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*
142
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*
143
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*
144
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*
145
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*
146
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*
147
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*
148
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*
149
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*
150
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.14:*:*:*:*:*:*:*
151
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.15:*:*:*:*:*:*:*
152
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.16:*:*:*:*:*:*:*
153
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.17:*:*:*:*:*:*:*
154
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.18:*:*:*:*:*:*:*
155
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.19:*:*:*:*:*:*:*
156
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*
157
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.20:*:*:*:*:*:*:*
158
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*
159
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*
160
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*
161
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*
162
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*
163
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*
164
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*
165
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*
166
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*
167
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*
168
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*
169
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*
170
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*
171
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*
172
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*
173
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*
174
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*
175
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*
176
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*
177
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
178
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*
179
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-0213
reference_id CVE-2013-0213
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-0213
180
reference_url https://access.redhat.com/errata/RHSA-2013:1310
reference_id RHSA-2013:1310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1310
181
reference_url https://access.redhat.com/errata/RHSA-2013:1542
reference_id RHSA-2013:1542
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1542
182
reference_url https://access.redhat.com/errata/RHSA-2014:0305
reference_id RHSA-2014:0305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0305
183
reference_url https://usn.ubuntu.com/2922-1/
reference_id USN-2922-1
reference_type
scores
url https://usn.ubuntu.com/2922-1/
fixed_packages
0
url pkg:deb/debian/samba@2:3.6.6-5?distro=trixie
purl pkg:deb/debian/samba@2:3.6.6-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:3.6.6-5%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2013-0213
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-epm9-d1pw-j7cw
86
url VCID-esjb-wmzz-fuc7
vulnerability_id VCID-esjb-wmzz-fuc7
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which may allow execution of arbitrary code with root privileges.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174076.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174076.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174391.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174391.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00002.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00046.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00046.html
10
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html
11
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html
12
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5252.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5252.json
13
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5252
reference_id
reference_type
scores
0
value 0.17333
scoring_system epss
scoring_elements 0.95062
published_at 2026-04-21T12:55:00Z
1
value 0.17333
scoring_system epss
scoring_elements 0.95058
published_at 2026-04-16T12:55:00Z
2
value 0.17333
scoring_system epss
scoring_elements 0.9506
published_at 2026-04-18T12:55:00Z
3
value 0.17333
scoring_system epss
scoring_elements 0.95013
published_at 2026-04-01T12:55:00Z
4
value 0.17333
scoring_system epss
scoring_elements 0.95024
published_at 2026-04-02T12:55:00Z
5
value 0.17333
scoring_system epss
scoring_elements 0.95025
published_at 2026-04-04T12:55:00Z
6
value 0.17333
scoring_system epss
scoring_elements 0.95027
published_at 2026-04-07T12:55:00Z
7
value 0.17333
scoring_system epss
scoring_elements 0.95035
published_at 2026-04-08T12:55:00Z
8
value 0.17333
scoring_system epss
scoring_elements 0.95039
published_at 2026-04-09T12:55:00Z
9
value 0.17333
scoring_system epss
scoring_elements 0.95044
published_at 2026-04-11T12:55:00Z
10
value 0.17333
scoring_system epss
scoring_elements 0.95046
published_at 2026-04-12T12:55:00Z
11
value 0.17333
scoring_system epss
scoring_elements 0.95048
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5252
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3223
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3223
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5252
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5252
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5296
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5299
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5330
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5330
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7540
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7540
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8467
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8467
21
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:C/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
22
reference_url https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=4278ef25f64d5fdbf432ff1534e275416ec9561e
reference_id
reference_type
scores
url https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=4278ef25f64d5fdbf432ff1534e275416ec9561e
23
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993
24
reference_url https://www.samba.org/samba/security/CVE-2015-5252.html
reference_id
reference_type
scores
url https://www.samba.org/samba/security/CVE-2015-5252.html
25
reference_url http://www.debian.org/security/2016/dsa-3433
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3433
26
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
27
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
28
reference_url http://www.securityfocus.com/bid/79733
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79733
29
reference_url http://www.securitytracker.com/id/1034493
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034493
30
reference_url http://www.ubuntu.com/usn/USN-2855-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2855-1
31
reference_url http://www.ubuntu.com/usn/USN-2855-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2855-2
32
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1290288
reference_id 1290288
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1290288
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-5252
reference_id CVE-2015-5252
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-5252
41
reference_url https://security.gentoo.org/glsa/201612-47
reference_id GLSA-201612-47
reference_type
scores
url https://security.gentoo.org/glsa/201612-47
42
reference_url https://access.redhat.com/errata/RHSA-2016:0006
reference_id RHSA-2016:0006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0006
43
reference_url https://access.redhat.com/errata/RHSA-2016:0010
reference_id RHSA-2016:0010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0010
44
reference_url https://access.redhat.com/errata/RHSA-2016:0011
reference_id RHSA-2016:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0011
45
reference_url https://access.redhat.com/errata/RHSA-2016:0015
reference_id RHSA-2016:0015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0015
46
reference_url https://access.redhat.com/errata/RHSA-2016:0016
reference_id RHSA-2016:0016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0016
47
reference_url https://usn.ubuntu.com/2855-1/
reference_id USN-2855-1
reference_type
scores
url https://usn.ubuntu.com/2855-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.1.22%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.1.22%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.1.22%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2015-5252
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-esjb-wmzz-fuc7
87
url VCID-ez9s-vn2t-w7a6
vulnerability_id VCID-ez9s-vn2t-w7a6
summary Multiple vulnerabilities have been discovered in Samba, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34968.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34968.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-34968
reference_id
reference_type
scores
0
value 0.02202
scoring_system epss
scoring_elements 0.84452
published_at 2026-04-21T12:55:00Z
1
value 0.02387
scoring_system epss
scoring_elements 0.84947
published_at 2026-04-02T12:55:00Z
2
value 0.02387
scoring_system epss
scoring_elements 0.84965
published_at 2026-04-04T12:55:00Z
3
value 0.02387
scoring_system epss
scoring_elements 0.84969
published_at 2026-04-07T12:55:00Z
4
value 0.02387
scoring_system epss
scoring_elements 0.84992
published_at 2026-04-08T12:55:00Z
5
value 0.02387
scoring_system epss
scoring_elements 0.84999
published_at 2026-04-09T12:55:00Z
6
value 0.02387
scoring_system epss
scoring_elements 0.85015
published_at 2026-04-11T12:55:00Z
7
value 0.02387
scoring_system epss
scoring_elements 0.85013
published_at 2026-04-12T12:55:00Z
8
value 0.02387
scoring_system epss
scoring_elements 0.8501
published_at 2026-04-13T12:55:00Z
9
value 0.02387
scoring_system epss
scoring_elements 0.85031
published_at 2026-04-16T12:55:00Z
10
value 0.02387
scoring_system epss
scoring_elements 0.85033
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-34968
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2222795
reference_id 2222795
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2222795
10
reference_url https://security.gentoo.org/glsa/202402-28
reference_id GLSA-202402-28
reference_type
scores
url https://security.gentoo.org/glsa/202402-28
11
reference_url https://access.redhat.com/errata/RHSA-2023:6667
reference_id RHSA-2023:6667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6667
12
reference_url https://access.redhat.com/errata/RHSA-2023:7139
reference_id RHSA-2023:7139
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7139
13
reference_url https://access.redhat.com/errata/RHSA-2024:0423
reference_id RHSA-2024:0423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0423
14
reference_url https://access.redhat.com/errata/RHSA-2024:0580
reference_id RHSA-2024:0580
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0580
15
reference_url https://usn.ubuntu.com/6238-1/
reference_id USN-6238-1
reference_type
scores
url https://usn.ubuntu.com/6238-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.17.10%2Bdfsg-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/samba@2:4.17.10%2Bdfsg-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.10%252Bdfsg-0%252Bdeb12u1%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.18.5%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.18.5%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.18.5%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
6
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2023-34968
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ez9s-vn2t-w7a6
88
url VCID-ezk6-jy86-y3h4
vulnerability_id VCID-ezk6-jy86-y3h4
summary Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2124.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2124.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2124
reference_id
reference_type
scores
0
value 0.00699
scoring_system epss
scoring_elements 0.72007
published_at 2026-04-21T12:55:00Z
1
value 0.00699
scoring_system epss
scoring_elements 0.71982
published_at 2026-04-09T12:55:00Z
2
value 0.00699
scoring_system epss
scoring_elements 0.72006
published_at 2026-04-11T12:55:00Z
3
value 0.00699
scoring_system epss
scoring_elements 0.71989
published_at 2026-04-12T12:55:00Z
4
value 0.00699
scoring_system epss
scoring_elements 0.71974
published_at 2026-04-13T12:55:00Z
5
value 0.00699
scoring_system epss
scoring_elements 0.72015
published_at 2026-04-16T12:55:00Z
6
value 0.00699
scoring_system epss
scoring_elements 0.72022
published_at 2026-04-18T12:55:00Z
7
value 0.00699
scoring_system epss
scoring_elements 0.71931
published_at 2026-04-07T12:55:00Z
8
value 0.00699
scoring_system epss
scoring_elements 0.7197
published_at 2026-04-08T12:55:00Z
9
value 0.00814
scoring_system epss
scoring_elements 0.74225
published_at 2026-04-02T12:55:00Z
10
value 0.00814
scoring_system epss
scoring_elements 0.74252
published_at 2026-04-04T12:55:00Z
11
value 0.00814
scoring_system epss
scoring_elements 0.7422
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2124
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.9
scoring_system cvssv2
scoring_elements AV:A/AC:M/Au:N/C:P/I:N/A:N
1
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2019660
reference_id 2019660
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2019660
12
reference_url https://security.archlinux.org/AVG-2539
reference_id AVG-2539
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2539
13
reference_url https://security.gentoo.org/glsa/202309-06
reference_id GLSA-202309-06
reference_type
scores
url https://security.gentoo.org/glsa/202309-06
14
reference_url https://access.redhat.com/errata/RHSA-2021:4843
reference_id RHSA-2021:4843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4843
15
reference_url https://access.redhat.com/errata/RHSA-2021:4844
reference_id RHSA-2021:4844
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4844
16
reference_url https://access.redhat.com/errata/RHSA-2021:5082
reference_id RHSA-2021:5082
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5082
17
reference_url https://access.redhat.com/errata/RHSA-2021:5192
reference_id RHSA-2021:5192
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5192
18
reference_url https://access.redhat.com/errata/RHSA-2022:0008
reference_id RHSA-2022:0008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0008
19
reference_url https://access.redhat.com/errata/RHSA-2022:0074
reference_id RHSA-2022:0074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0074
20
reference_url https://usn.ubuntu.com/5142-1/
reference_id USN-5142-1
reference_type
scores
url https://usn.ubuntu.com/5142-1/
21
reference_url https://usn.ubuntu.com/5174-1/
reference_id USN-5174-1
reference_type
scores
url https://usn.ubuntu.com/5174-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u2?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u2%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.13.14%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.13.14%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.14%252Bdfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
6
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2016-2124
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ezk6-jy86-y3h4
89
url VCID-f772-3dtd-wba8
vulnerability_id VCID-f772-3dtd-wba8
summary Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32742.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32742.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32742
reference_id
reference_type
scores
0
value 0.00272
scoring_system epss
scoring_elements 0.50607
published_at 2026-04-02T12:55:00Z
1
value 0.00574
scoring_system epss
scoring_elements 0.68742
published_at 2026-04-21T12:55:00Z
2
value 0.00574
scoring_system epss
scoring_elements 0.68662
published_at 2026-04-07T12:55:00Z
3
value 0.00574
scoring_system epss
scoring_elements 0.68714
published_at 2026-04-08T12:55:00Z
4
value 0.00574
scoring_system epss
scoring_elements 0.68732
published_at 2026-04-09T12:55:00Z
5
value 0.00574
scoring_system epss
scoring_elements 0.68754
published_at 2026-04-11T12:55:00Z
6
value 0.00574
scoring_system epss
scoring_elements 0.6874
published_at 2026-04-12T12:55:00Z
7
value 0.00574
scoring_system epss
scoring_elements 0.68711
published_at 2026-04-13T12:55:00Z
8
value 0.00574
scoring_system epss
scoring_elements 0.68753
published_at 2026-04-16T12:55:00Z
9
value 0.00574
scoring_system epss
scoring_elements 0.68764
published_at 2026-04-18T12:55:00Z
10
value 0.00574
scoring_system epss
scoring_elements 0.68685
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32742
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449
reference_id 1016449
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2108196
reference_id 2108196
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2108196
10
reference_url https://security.archlinux.org/AVG-2782
reference_id AVG-2782
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2782
11
reference_url https://www.samba.org/samba/security/CVE-2022-32742.html
reference_id CVE-2022-32742.html
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T19:44:06Z/
url https://www.samba.org/samba/security/CVE-2022-32742.html
12
reference_url https://security.gentoo.org/glsa/202309-06
reference_id GLSA-202309-06
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T19:44:06Z/
url https://security.gentoo.org/glsa/202309-06
13
reference_url https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html
reference_id msg00015.html
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T19:44:06Z/
url https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html
14
reference_url https://access.redhat.com/errata/RHSA-2022:7056
reference_id RHSA-2022:7056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7056
15
reference_url https://access.redhat.com/errata/RHSA-2022:7111
reference_id RHSA-2022:7111
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7111
16
reference_url https://access.redhat.com/errata/RHSA-2022:8317
reference_id RHSA-2022:8317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8317
17
reference_url https://usn.ubuntu.com/5542-1/
reference_id USN-5542-1
reference_type
scores
url https://usn.ubuntu.com/5542-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u5?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u5%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.16.4%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.16.4%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.16.4%252Bdfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
6
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2022-32742
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f772-3dtd-wba8
90
url VCID-f9hv-k2xk-puhq
vulnerability_id VCID-f9hv-k2xk-puhq
summary Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25719.json
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25719.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-25719
reference_id
reference_type
scores
0
value 0.00213
scoring_system epss
scoring_elements 0.43818
published_at 2026-04-21T12:55:00Z
1
value 0.00213
scoring_system epss
scoring_elements 0.4388
published_at 2026-04-11T12:55:00Z
2
value 0.00213
scoring_system epss
scoring_elements 0.43848
published_at 2026-04-12T12:55:00Z
3
value 0.00213
scoring_system epss
scoring_elements 0.43831
published_at 2026-04-13T12:55:00Z
4
value 0.00213
scoring_system epss
scoring_elements 0.43893
published_at 2026-04-16T12:55:00Z
5
value 0.00213
scoring_system epss
scoring_elements 0.43885
published_at 2026-04-18T12:55:00Z
6
value 0.00213
scoring_system epss
scoring_elements 0.43809
published_at 2026-04-07T12:55:00Z
7
value 0.00213
scoring_system epss
scoring_elements 0.43859
published_at 2026-04-08T12:55:00Z
8
value 0.00213
scoring_system epss
scoring_elements 0.43862
published_at 2026-04-09T12:55:00Z
9
value 0.00248
scoring_system epss
scoring_elements 0.4808
published_at 2026-04-02T12:55:00Z
10
value 0.00248
scoring_system epss
scoring_elements 0.48101
published_at 2026-04-04T12:55:00Z
11
value 0.00248
scoring_system epss
scoring_elements 0.48042
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-25719
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2019732
reference_id 2019732
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2019732
12
reference_url https://security.archlinux.org/AVG-2538
reference_id AVG-2538
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2538
13
reference_url https://security.gentoo.org/glsa/202309-06
reference_id GLSA-202309-06
reference_type
scores
url https://security.gentoo.org/glsa/202309-06
14
reference_url https://access.redhat.com/errata/RHSA-2021:5142
reference_id RHSA-2021:5142
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5142
15
reference_url https://access.redhat.com/errata/RHSA-2021:5195
reference_id RHSA-2021:5195
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5195
16
reference_url https://access.redhat.com/errata/RHSA-2022:0007
reference_id RHSA-2022:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0007
17
reference_url https://access.redhat.com/errata/RHSA-2022:0076
reference_id RHSA-2022:0076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0076
18
reference_url https://usn.ubuntu.com/5142-1/
reference_id USN-5142-1
reference_type
scores
url https://usn.ubuntu.com/5142-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u2?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u2%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.13.14%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.13.14%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.14%252Bdfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
6
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2020-25719
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f9hv-k2xk-puhq
91
url VCID-fc2s-dwmh-w3gf
vulnerability_id VCID-fc2s-dwmh-w3gf
summary samba: Privileges elevation to Active Directory Domain Controller
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8143.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8143.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8143
reference_id
reference_type
scores
0
value 0.04898
scoring_system epss
scoring_elements 0.89556
published_at 2026-04-01T12:55:00Z
1
value 0.04898
scoring_system epss
scoring_elements 0.8956
published_at 2026-04-02T12:55:00Z
2
value 0.04898
scoring_system epss
scoring_elements 0.89573
published_at 2026-04-07T12:55:00Z
3
value 0.04898
scoring_system epss
scoring_elements 0.8959
published_at 2026-04-08T12:55:00Z
4
value 0.04898
scoring_system epss
scoring_elements 0.89595
published_at 2026-04-13T12:55:00Z
5
value 0.04898
scoring_system epss
scoring_elements 0.89602
published_at 2026-04-11T12:55:00Z
6
value 0.04898
scoring_system epss
scoring_elements 0.89601
published_at 2026-04-12T12:55:00Z
7
value 0.04898
scoring_system epss
scoring_elements 0.89608
published_at 2026-04-16T12:55:00Z
8
value 0.04898
scoring_system epss
scoring_elements 0.8961
published_at 2026-04-18T12:55:00Z
9
value 0.04898
scoring_system epss
scoring_elements 0.89606
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8143
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8143
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1181638
reference_id 1181638
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1181638
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776993
reference_id 776993
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776993
5
reference_url https://usn.ubuntu.com/2481-1/
reference_id USN-2481-1
reference_type
scores
url https://usn.ubuntu.com/2481-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.1.17%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.1.17%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.1.17%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2014-8143
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fc2s-dwmh-w3gf
92
url VCID-fh3j-efv1-tybp
vulnerability_id VCID-fh3j-efv1-tybp
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10700.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10700.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-10700
reference_id
reference_type
scores
0
value 0.02857
scoring_system epss
scoring_elements 0.86182
published_at 2026-04-01T12:55:00Z
1
value 0.02857
scoring_system epss
scoring_elements 0.86192
published_at 2026-04-02T12:55:00Z
2
value 0.02857
scoring_system epss
scoring_elements 0.86205
published_at 2026-04-07T12:55:00Z
3
value 0.02857
scoring_system epss
scoring_elements 0.86224
published_at 2026-04-08T12:55:00Z
4
value 0.02857
scoring_system epss
scoring_elements 0.86235
published_at 2026-04-09T12:55:00Z
5
value 0.02857
scoring_system epss
scoring_elements 0.8625
published_at 2026-04-11T12:55:00Z
6
value 0.02857
scoring_system epss
scoring_elements 0.86247
published_at 2026-04-12T12:55:00Z
7
value 0.02857
scoring_system epss
scoring_elements 0.86243
published_at 2026-04-13T12:55:00Z
8
value 0.02857
scoring_system epss
scoring_elements 0.8626
published_at 2026-04-16T12:55:00Z
9
value 0.02857
scoring_system epss
scoring_elements 0.86265
published_at 2026-04-18T12:55:00Z
10
value 0.02857
scoring_system epss
scoring_elements 0.86259
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-10700
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10700
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10700
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1825731
reference_id 1825731
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1825731
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960189
reference_id 960189
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960189
6
reference_url https://security.gentoo.org/glsa/202007-15
reference_id GLSA-202007-15
reference_type
scores
url https://security.gentoo.org/glsa/202007-15
7
reference_url https://usn.ubuntu.com/4341-1/
reference_id USN-4341-1
reference_type
scores
url https://usn.ubuntu.com/4341-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.12.3%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.12.3%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.12.3%252Bdfsg-2%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2020-10700
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fh3j-efv1-tybp
93
url VCID-fhxt-mhur-97gm
vulnerability_id VCID-fhxt-mhur-97gm
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which may allow execution of arbitrary code with root privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0870.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0870.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0870
reference_id
reference_type
scores
0
value 0.46876
scoring_system epss
scoring_elements 0.97648
published_at 2026-04-01T12:55:00Z
1
value 0.46876
scoring_system epss
scoring_elements 0.97655
published_at 2026-04-02T12:55:00Z
2
value 0.46876
scoring_system epss
scoring_elements 0.97656
published_at 2026-04-04T12:55:00Z
3
value 0.46876
scoring_system epss
scoring_elements 0.97657
published_at 2026-04-07T12:55:00Z
4
value 0.46876
scoring_system epss
scoring_elements 0.97662
published_at 2026-04-08T12:55:00Z
5
value 0.46876
scoring_system epss
scoring_elements 0.97664
published_at 2026-04-09T12:55:00Z
6
value 0.46876
scoring_system epss
scoring_elements 0.97666
published_at 2026-04-11T12:55:00Z
7
value 0.46876
scoring_system epss
scoring_elements 0.97669
published_at 2026-04-12T12:55:00Z
8
value 0.46876
scoring_system epss
scoring_elements 0.9767
published_at 2026-04-13T12:55:00Z
9
value 0.46876
scoring_system epss
scoring_elements 0.97677
published_at 2026-04-16T12:55:00Z
10
value 0.46876
scoring_system epss
scoring_elements 0.97679
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0870
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0870
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=795509
reference_id 795509
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=795509
4
reference_url https://security.gentoo.org/glsa/201206-22
reference_id GLSA-201206-22
reference_type
scores
url https://security.gentoo.org/glsa/201206-22
5
reference_url https://access.redhat.com/errata/RHSA-2012:0332
reference_id RHSA-2012:0332
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0332
6
reference_url https://usn.ubuntu.com/1374-1/
reference_id USN-1374-1
reference_type
scores
url https://usn.ubuntu.com/1374-1/
fixed_packages
0
url pkg:deb/debian/samba@2:3.4.0~pre1-1?distro=trixie
purl pkg:deb/debian/samba@2:3.4.0~pre1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:3.4.0~pre1-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-0870
risk_score 0.2
exploitability 0.5
weighted_severity 0.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fhxt-mhur-97gm
94
url VCID-fkap-r6vh-ubem
vulnerability_id VCID-fkap-r6vh-ubem
summary
Multiple flaws exist in the Samba suite of programs, the most serious of
    which could result in the execution of arbitrary code.
references
0
reference_url ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc
1
reference_url http://fedoranews.org/cms/node/2579
reference_id
reference_type
scores
url http://fedoranews.org/cms/node/2579
2
reference_url http://fedoranews.org/cms/node/2580
reference_id
reference_type
scores
url http://fedoranews.org/cms/node/2580
3
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00943462
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00943462
4
reference_url http://lists.suse.com/archive/suse-security-announce/2007-Feb/0002.html
reference_id
reference_type
scores
url http://lists.suse.com/archive/suse-security-announce/2007-Feb/0002.html
5
reference_url http://osvdb.org/33100
reference_id
reference_type
scores
url http://osvdb.org/33100
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0452.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0452.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-0452
reference_id
reference_type
scores
0
value 0.02271
scoring_system epss
scoring_elements 0.84673
published_at 2026-04-21T12:55:00Z
1
value 0.02271
scoring_system epss
scoring_elements 0.84576
published_at 2026-04-01T12:55:00Z
2
value 0.02271
scoring_system epss
scoring_elements 0.8459
published_at 2026-04-02T12:55:00Z
3
value 0.02271
scoring_system epss
scoring_elements 0.84611
published_at 2026-04-04T12:55:00Z
4
value 0.02271
scoring_system epss
scoring_elements 0.84613
published_at 2026-04-07T12:55:00Z
5
value 0.02271
scoring_system epss
scoring_elements 0.84635
published_at 2026-04-08T12:55:00Z
6
value 0.02271
scoring_system epss
scoring_elements 0.84641
published_at 2026-04-09T12:55:00Z
7
value 0.02271
scoring_system epss
scoring_elements 0.84659
published_at 2026-04-11T12:55:00Z
8
value 0.02271
scoring_system epss
scoring_elements 0.84655
published_at 2026-04-12T12:55:00Z
9
value 0.02271
scoring_system epss
scoring_elements 0.8465
published_at 2026-04-13T12:55:00Z
10
value 0.02271
scoring_system epss
scoring_elements 0.84671
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-0452
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0452
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0452
9
reference_url http://secunia.com/advisories/24021
reference_id
reference_type
scores
url http://secunia.com/advisories/24021
10
reference_url http://secunia.com/advisories/24030
reference_id
reference_type
scores
url http://secunia.com/advisories/24030
11
reference_url http://secunia.com/advisories/24046
reference_id
reference_type
scores
url http://secunia.com/advisories/24046
12
reference_url http://secunia.com/advisories/24060
reference_id
reference_type
scores
url http://secunia.com/advisories/24060
13
reference_url http://secunia.com/advisories/24067
reference_id
reference_type
scores
url http://secunia.com/advisories/24067
14
reference_url http://secunia.com/advisories/24076
reference_id
reference_type
scores
url http://secunia.com/advisories/24076
15
reference_url http://secunia.com/advisories/24101
reference_id
reference_type
scores
url http://secunia.com/advisories/24101
16
reference_url http://secunia.com/advisories/24140
reference_id
reference_type
scores
url http://secunia.com/advisories/24140
17
reference_url http://secunia.com/advisories/24145
reference_id
reference_type
scores
url http://secunia.com/advisories/24145
18
reference_url http://secunia.com/advisories/24151
reference_id
reference_type
scores
url http://secunia.com/advisories/24151
19
reference_url http://secunia.com/advisories/24188
reference_id
reference_type
scores
url http://secunia.com/advisories/24188
20
reference_url http://secunia.com/advisories/24284
reference_id
reference_type
scores
url http://secunia.com/advisories/24284
21
reference_url http://secunia.com/advisories/24792
reference_id
reference_type
scores
url http://secunia.com/advisories/24792
22
reference_url http://securityreason.com/securityalert/2219
reference_id
reference_type
scores
url http://securityreason.com/securityalert/2219
23
reference_url http://securitytracker.com/id?1017587
reference_id
reference_type
scores
url http://securitytracker.com/id?1017587
24
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/32301
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/32301
25
reference_url https://issues.rpath.com/browse/RPL-1005
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1005
26
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.476916
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.476916
27
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9758
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9758
28
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-66-200588-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-66-200588-1
29
reference_url http://us1.samba.org/samba/security/CVE-2007-0452.html
reference_id
reference_type
scores
url http://us1.samba.org/samba/security/CVE-2007-0452.html
30
reference_url http://www.debian.org/security/2007/dsa-1257
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1257
31
reference_url http://www.gentoo.org/security/en/glsa/glsa-200702-01.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200702-01.xml
32
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:034
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:034
33
reference_url http://www.redhat.com/support/errata/RHSA-2007-0060.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0060.html
34
reference_url http://www.redhat.com/support/errata/RHSA-2007-0061.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0061.html
35
reference_url http://www.securityfocus.com/archive/1/459167/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/459167/100/0/threaded
36
reference_url http://www.securityfocus.com/archive/1/459365/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/459365/100/0/threaded
37
reference_url http://www.securityfocus.com/bid/22395
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/22395
38
reference_url http://www.trustix.org/errata/2007/0007
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0007
39
reference_url http://www.ubuntu.com/usn/usn-419-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-419-1
40
reference_url http://www.vupen.com/english/advisories/2007/0483
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/0483
41
reference_url http://www.vupen.com/english/advisories/2007/1278
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1278
42
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618269
reference_id 1618269
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618269
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-0452
reference_id CVE-2007-0452
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2007-0452
66
reference_url https://security.gentoo.org/glsa/200702-01
reference_id GLSA-200702-01
reference_type
scores
url https://security.gentoo.org/glsa/200702-01
67
reference_url https://access.redhat.com/errata/RHSA-2007:0060
reference_id RHSA-2007:0060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0060
68
reference_url https://access.redhat.com/errata/RHSA-2007:0061
reference_id RHSA-2007:0061
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0061
69
reference_url https://usn.ubuntu.com/419-1/
reference_id USN-419-1
reference_type
scores
url https://usn.ubuntu.com/419-1/
fixed_packages
0
url pkg:deb/debian/samba@3.0.23d-5?distro=trixie
purl pkg:deb/debian/samba@3.0.23d-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@3.0.23d-5%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2007-0452
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fkap-r6vh-ubem
95
url VCID-frnd-3wwy-93ek
vulnerability_id VCID-frnd-3wwy-93ek
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14870.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14870.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-14870
reference_id
reference_type
scores
0
value 0.04669
scoring_system epss
scoring_elements 0.89278
published_at 2026-04-01T12:55:00Z
1
value 0.04669
scoring_system epss
scoring_elements 0.89283
published_at 2026-04-02T12:55:00Z
2
value 0.04669
scoring_system epss
scoring_elements 0.89297
published_at 2026-04-04T12:55:00Z
3
value 0.04669
scoring_system epss
scoring_elements 0.893
published_at 2026-04-07T12:55:00Z
4
value 0.04669
scoring_system epss
scoring_elements 0.89317
published_at 2026-04-08T12:55:00Z
5
value 0.04669
scoring_system epss
scoring_elements 0.89321
published_at 2026-04-09T12:55:00Z
6
value 0.04669
scoring_system epss
scoring_elements 0.8933
published_at 2026-04-11T12:55:00Z
7
value 0.04669
scoring_system epss
scoring_elements 0.89328
published_at 2026-04-12T12:55:00Z
8
value 0.04669
scoring_system epss
scoring_elements 0.89324
published_at 2026-04-13T12:55:00Z
9
value 0.04669
scoring_system epss
scoring_elements 0.89338
published_at 2026-04-16T12:55:00Z
10
value 0.04669
scoring_system epss
scoring_elements 0.89337
published_at 2026-04-18T12:55:00Z
11
value 0.04669
scoring_system epss
scoring_elements 0.89332
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-14870
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14870
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1778589
reference_id 1778589
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1778589
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946786
reference_id 946786
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946786
6
reference_url https://security.gentoo.org/glsa/202003-52
reference_id GLSA-202003-52
reference_type
scores
url https://security.gentoo.org/glsa/202003-52
7
reference_url https://security.gentoo.org/glsa/202310-06
reference_id GLSA-202310-06
reference_type
scores
url https://security.gentoo.org/glsa/202310-06
8
reference_url https://usn.ubuntu.com/4217-1/
reference_id USN-4217-1
reference_type
scores
url https://usn.ubuntu.com/4217-1/
9
reference_url https://usn.ubuntu.com/4217-2/
reference_id USN-4217-2
reference_type
scores
url https://usn.ubuntu.com/4217-2/
fixed_packages
0
url pkg:deb/debian/samba@2:4.11.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.11.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.11.3%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2019-14870
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-frnd-3wwy-93ek
96
url VCID-fskg-j9fe-6yeg
vulnerability_id VCID-fskg-j9fe-6yeg
summary Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20251.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20251.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-20251
reference_id
reference_type
scores
0
value 0.00222
scoring_system epss
scoring_elements 0.44742
published_at 2026-04-01T12:55:00Z
1
value 0.00222
scoring_system epss
scoring_elements 0.44822
published_at 2026-04-02T12:55:00Z
2
value 0.00222
scoring_system epss
scoring_elements 0.44807
published_at 2026-04-21T12:55:00Z
3
value 0.00222
scoring_system epss
scoring_elements 0.44855
published_at 2026-04-11T12:55:00Z
4
value 0.00222
scoring_system epss
scoring_elements 0.44824
published_at 2026-04-12T12:55:00Z
5
value 0.00222
scoring_system epss
scoring_elements 0.44826
published_at 2026-04-13T12:55:00Z
6
value 0.00222
scoring_system epss
scoring_elements 0.44879
published_at 2026-04-16T12:55:00Z
7
value 0.00222
scoring_system epss
scoring_elements 0.44872
published_at 2026-04-18T12:55:00Z
8
value 0.00222
scoring_system epss
scoring_elements 0.44843
published_at 2026-04-04T12:55:00Z
9
value 0.00222
scoring_system epss
scoring_elements 0.44783
published_at 2026-04-07T12:55:00Z
10
value 0.00222
scoring_system epss
scoring_elements 0.44836
published_at 2026-04-08T12:55:00Z
11
value 0.00222
scoring_system epss
scoring_elements 0.44838
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-20251
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20251
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20251
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1929800
reference_id 1929800
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:49:41Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=1929800
5
reference_url https://security.gentoo.org/glsa/202309-06
reference_id GLSA-202309-06
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:49:41Z/
url https://security.gentoo.org/glsa/202309-06
6
reference_url https://security.netapp.com/advisory/ntap-20230331-0005/
reference_id ntap-20230331-0005
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:49:41Z/
url https://security.netapp.com/advisory/ntap-20230331-0005/
7
reference_url https://bugzilla.samba.org/show_bug.cgi?id=14611
reference_id show_bug.cgi?id=14611
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:49:41Z/
url https://bugzilla.samba.org/show_bug.cgi?id=14611
8
reference_url https://usn.ubuntu.com/5822-1/
reference_id USN-5822-1
reference_type
scores
url https://usn.ubuntu.com/5822-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.17.2%2Bdfsg-3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.2%2Bdfsg-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.2%252Bdfsg-3%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2021-20251
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fskg-j9fe-6yeg
97
url VCID-fwan-19ua-ufgj
vulnerability_id VCID-fwan-19ua-ufgj
summary samba4: may provide authenticated users with write access to LDAP directory objects when used as an AD DC
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0172.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0172.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-0172
reference_id
reference_type
scores
0
value 0.00283
scoring_system epss
scoring_elements 0.51664
published_at 2026-04-21T12:55:00Z
1
value 0.00283
scoring_system epss
scoring_elements 0.51536
published_at 2026-04-01T12:55:00Z
2
value 0.00283
scoring_system epss
scoring_elements 0.51588
published_at 2026-04-02T12:55:00Z
3
value 0.00283
scoring_system epss
scoring_elements 0.51614
published_at 2026-04-04T12:55:00Z
4
value 0.00283
scoring_system epss
scoring_elements 0.51574
published_at 2026-04-07T12:55:00Z
5
value 0.00283
scoring_system epss
scoring_elements 0.51629
published_at 2026-04-08T12:55:00Z
6
value 0.00283
scoring_system epss
scoring_elements 0.51625
published_at 2026-04-09T12:55:00Z
7
value 0.00283
scoring_system epss
scoring_elements 0.51673
published_at 2026-04-11T12:55:00Z
8
value 0.00283
scoring_system epss
scoring_elements 0.51651
published_at 2026-04-12T12:55:00Z
9
value 0.00283
scoring_system epss
scoring_elements 0.51635
published_at 2026-04-13T12:55:00Z
10
value 0.00283
scoring_system epss
scoring_elements 0.51676
published_at 2026-04-16T12:55:00Z
11
value 0.00283
scoring_system epss
scoring_elements 0.51684
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-0172
2
reference_url http://www.samba.org/samba/security/CVE-2013-0172
reference_id
reference_type
scores
url http://www.samba.org/samba/security/CVE-2013-0172
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=895631
reference_id 895631
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=895631
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-0172
reference_id CVE-2013-0172
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2013-0172
fixed_packages
0
url pkg:deb/debian/samba@0?distro=trixie
purl pkg:deb/debian/samba@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@0%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2013-0172
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fwan-19ua-ufgj
98
url VCID-fxgm-p1bm-r7ev
vulnerability_id VCID-fxgm-p1bm-r7ev
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15275.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15275.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15275
reference_id
reference_type
scores
0
value 0.4327
scoring_system epss
scoring_elements 0.97511
published_at 2026-04-21T12:55:00Z
1
value 0.4327
scoring_system epss
scoring_elements 0.97498
published_at 2026-04-11T12:55:00Z
2
value 0.4327
scoring_system epss
scoring_elements 0.975
published_at 2026-04-12T12:55:00Z
3
value 0.4327
scoring_system epss
scoring_elements 0.97501
published_at 2026-04-13T12:55:00Z
4
value 0.4327
scoring_system epss
scoring_elements 0.97509
published_at 2026-04-16T12:55:00Z
5
value 0.4327
scoring_system epss
scoring_elements 0.9751
published_at 2026-04-18T12:55:00Z
6
value 0.44014
scoring_system epss
scoring_elements 0.97522
published_at 2026-04-02T12:55:00Z
7
value 0.44014
scoring_system epss
scoring_elements 0.97525
published_at 2026-04-04T12:55:00Z
8
value 0.44014
scoring_system epss
scoring_elements 0.97516
published_at 2026-04-01T12:55:00Z
9
value 0.45047
scoring_system epss
scoring_elements 0.97587
published_at 2026-04-09T12:55:00Z
10
value 0.49745
scoring_system epss
scoring_elements 0.97801
published_at 2026-04-08T12:55:00Z
11
value 0.49745
scoring_system epss
scoring_elements 0.97796
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15275
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14746
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15275
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15275
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://lists.debian.org/debian-lts-announce/2017/11/msg00029.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/11/msg00029.html
6
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03817en_us
reference_id
reference_type
scores
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03817en_us
7
reference_url https://www.debian.org/security/2017/dsa-4043
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-4043
8
reference_url https://www.samba.org/samba/security/CVE-2017-15275.html
reference_id
reference_type
scores
url https://www.samba.org/samba/security/CVE-2017-15275.html
9
reference_url https://www.synology.com/support/security/Synology_SA_17_72_Samba
reference_id
reference_type
scores
url https://www.synology.com/support/security/Synology_SA_17_72_Samba
10
reference_url http://www.securityfocus.com/bid/101908
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101908
11
reference_url http://www.securitytracker.com/id/1039855
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039855
12
reference_url http://www.ubuntu.com/usn/USN-3486-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3486-1
13
reference_url http://www.ubuntu.com/usn/USN-3486-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3486-2
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1512465
reference_id 1512465
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1512465
15
reference_url https://security.archlinux.org/ASA-201712-1
reference_id ASA-201712-1
reference_type
scores
url https://security.archlinux.org/ASA-201712-1
16
reference_url https://security.archlinux.org/AVG-535
reference_id AVG-535
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-535
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15275
reference_id CVE-2017-15275
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-15275
31
reference_url https://security.gentoo.org/glsa/201805-07
reference_id GLSA-201805-07
reference_type
scores
url https://security.gentoo.org/glsa/201805-07
32
reference_url https://access.redhat.com/errata/RHSA-2017:3260
reference_id RHSA-2017:3260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3260
33
reference_url https://access.redhat.com/errata/RHSA-2017:3261
reference_id RHSA-2017:3261
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3261
34
reference_url https://access.redhat.com/errata/RHSA-2017:3278
reference_id RHSA-2017:3278
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3278
35
reference_url https://usn.ubuntu.com/3486-1/
reference_id USN-3486-1
reference_type
scores
url https://usn.ubuntu.com/3486-1/
36
reference_url https://usn.ubuntu.com/3486-2/
reference_id USN-3486-2
reference_type
scores
url https://usn.ubuntu.com/3486-2/
fixed_packages
0
url pkg:deb/debian/samba@2:4.7.1%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.7.1%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.7.1%252Bdfsg-2%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2017-15275
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fxgm-p1bm-r7ev
99
url VCID-g7xy-qtjb-aka2
vulnerability_id VCID-g7xy-qtjb-aka2
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0082.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0082.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0082
reference_id
reference_type
scores
0
value 0.02082
scoring_system epss
scoring_elements 0.83927
published_at 2026-04-01T12:55:00Z
1
value 0.02082
scoring_system epss
scoring_elements 0.83942
published_at 2026-04-02T12:55:00Z
2
value 0.02082
scoring_system epss
scoring_elements 0.83957
published_at 2026-04-04T12:55:00Z
3
value 0.02082
scoring_system epss
scoring_elements 0.8396
published_at 2026-04-07T12:55:00Z
4
value 0.02082
scoring_system epss
scoring_elements 0.83983
published_at 2026-04-08T12:55:00Z
5
value 0.02082
scoring_system epss
scoring_elements 0.8399
published_at 2026-04-09T12:55:00Z
6
value 0.02082
scoring_system epss
scoring_elements 0.84005
published_at 2026-04-11T12:55:00Z
7
value 0.02082
scoring_system epss
scoring_elements 0.83999
published_at 2026-04-12T12:55:00Z
8
value 0.02082
scoring_system epss
scoring_elements 0.83995
published_at 2026-04-13T12:55:00Z
9
value 0.02082
scoring_system epss
scoring_elements 0.8402
published_at 2026-04-16T12:55:00Z
10
value 0.02082
scoring_system epss
scoring_elements 0.84021
published_at 2026-04-18T12:55:00Z
11
value 0.02082
scoring_system epss
scoring_elements 0.84023
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0082
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0082
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0082
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617143
reference_id 1617143
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617143
4
reference_url https://access.redhat.com/errata/RHSA-2004:064
reference_id RHSA-2004:064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:064
fixed_packages
0
url pkg:deb/debian/samba@3.0.7?distro=trixie
purl pkg:deb/debian/samba@3.0.7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@3.0.7%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2004-0082
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g7xy-qtjb-aka2
100
url VCID-gs98-hcdd-2yf9
vulnerability_id VCID-gs98-hcdd-2yf9
summary Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25717.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25717.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-25717
reference_id
reference_type
scores
0
value 0.00517
scoring_system epss
scoring_elements 0.66722
published_at 2026-04-21T12:55:00Z
1
value 0.00517
scoring_system epss
scoring_elements 0.66732
published_at 2026-04-11T12:55:00Z
2
value 0.00517
scoring_system epss
scoring_elements 0.6672
published_at 2026-04-12T12:55:00Z
3
value 0.00517
scoring_system epss
scoring_elements 0.6669
published_at 2026-04-13T12:55:00Z
4
value 0.00517
scoring_system epss
scoring_elements 0.66723
published_at 2026-04-16T12:55:00Z
5
value 0.00517
scoring_system epss
scoring_elements 0.66737
published_at 2026-04-18T12:55:00Z
6
value 0.00517
scoring_system epss
scoring_elements 0.66649
published_at 2026-04-07T12:55:00Z
7
value 0.00517
scoring_system epss
scoring_elements 0.66698
published_at 2026-04-08T12:55:00Z
8
value 0.00517
scoring_system epss
scoring_elements 0.66713
published_at 2026-04-09T12:55:00Z
9
value 0.00518
scoring_system epss
scoring_elements 0.66712
published_at 2026-04-02T12:55:00Z
10
value 0.00518
scoring_system epss
scoring_elements 0.66738
published_at 2026-04-04T12:55:00Z
11
value 0.00518
scoring_system epss
scoring_elements 0.66673
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-25717
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2019672
reference_id 2019672
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2019672
12
reference_url https://security.archlinux.org/AVG-2538
reference_id AVG-2538
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2538
13
reference_url https://security.gentoo.org/glsa/202309-06
reference_id GLSA-202309-06
reference_type
scores
url https://security.gentoo.org/glsa/202309-06
14
reference_url https://access.redhat.com/errata/RHSA-2021:4843
reference_id RHSA-2021:4843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4843
15
reference_url https://access.redhat.com/errata/RHSA-2021:4844
reference_id RHSA-2021:4844
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4844
16
reference_url https://access.redhat.com/errata/RHSA-2021:5082
reference_id RHSA-2021:5082
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5082
17
reference_url https://access.redhat.com/errata/RHSA-2021:5192
reference_id RHSA-2021:5192
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5192
18
reference_url https://access.redhat.com/errata/RHSA-2022:0008
reference_id RHSA-2022:0008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0008
19
reference_url https://access.redhat.com/errata/RHSA-2022:0074
reference_id RHSA-2022:0074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0074
20
reference_url https://access.redhat.com/errata/RHSA-2022:0133
reference_id RHSA-2022:0133
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0133
21
reference_url https://access.redhat.com/errata/RHSA-2022:0443
reference_id RHSA-2022:0443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0443
22
reference_url https://usn.ubuntu.com/5142-1/
reference_id USN-5142-1
reference_type
scores
url https://usn.ubuntu.com/5142-1/
23
reference_url https://usn.ubuntu.com/5174-1/
reference_id USN-5174-1
reference_type
scores
url https://usn.ubuntu.com/5174-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u2?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u2%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.13.14%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.13.14%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.14%252Bdfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
6
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2020-25717
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gs98-hcdd-2yf9
101
url VCID-h2pu-vhv4-yfhx
vulnerability_id VCID-h2pu-vhv4-yfhx
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16851.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16851.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-16851
reference_id
reference_type
scores
0
value 0.09195
scoring_system epss
scoring_elements 0.92672
published_at 2026-04-01T12:55:00Z
1
value 0.09195
scoring_system epss
scoring_elements 0.9272
published_at 2026-04-21T12:55:00Z
2
value 0.09195
scoring_system epss
scoring_elements 0.92703
published_at 2026-04-13T12:55:00Z
3
value 0.09195
scoring_system epss
scoring_elements 0.92715
published_at 2026-04-18T12:55:00Z
4
value 0.09195
scoring_system epss
scoring_elements 0.92679
published_at 2026-04-02T12:55:00Z
5
value 0.09195
scoring_system epss
scoring_elements 0.92685
published_at 2026-04-04T12:55:00Z
6
value 0.09195
scoring_system epss
scoring_elements 0.92684
published_at 2026-04-07T12:55:00Z
7
value 0.09195
scoring_system epss
scoring_elements 0.92694
published_at 2026-04-08T12:55:00Z
8
value 0.09195
scoring_system epss
scoring_elements 0.92699
published_at 2026-04-09T12:55:00Z
9
value 0.09195
scoring_system epss
scoring_elements 0.92705
published_at 2026-04-11T12:55:00Z
10
value 0.09195
scoring_system epss
scoring_elements 0.92704
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-16851
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14629
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16841
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16841
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16851
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1646377
reference_id 1646377
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1646377
7
reference_url https://security.archlinux.org/ASA-201811-22
reference_id ASA-201811-22
reference_type
scores
url https://security.archlinux.org/ASA-201811-22
8
reference_url https://security.archlinux.org/AVG-823
reference_id AVG-823
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-823
9
reference_url https://security.gentoo.org/glsa/202003-52
reference_id GLSA-202003-52
reference_type
scores
url https://security.gentoo.org/glsa/202003-52
10
reference_url https://usn.ubuntu.com/3827-1/
reference_id USN-3827-1
reference_type
scores
url https://usn.ubuntu.com/3827-1/
11
reference_url https://usn.ubuntu.com/3827-2/
reference_id USN-3827-2
reference_type
scores
url https://usn.ubuntu.com/3827-2/
fixed_packages
0
url pkg:deb/debian/samba@2:4.9.2%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.9.2%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.2%252Bdfsg-2%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2018-16851
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h2pu-vhv4-yfhx
102
url VCID-h4br-qmyf-pug1
vulnerability_id VCID-h4br-qmyf-pug1
summary Samba improper file access
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1888.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1888.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1888
reference_id
reference_type
scores
0
value 0.05392
scoring_system epss
scoring_elements 0.9008
published_at 2026-04-01T12:55:00Z
1
value 0.05392
scoring_system epss
scoring_elements 0.90082
published_at 2026-04-02T12:55:00Z
2
value 0.05392
scoring_system epss
scoring_elements 0.90094
published_at 2026-04-04T12:55:00Z
3
value 0.05392
scoring_system epss
scoring_elements 0.90099
published_at 2026-04-07T12:55:00Z
4
value 0.05392
scoring_system epss
scoring_elements 0.90114
published_at 2026-04-08T12:55:00Z
5
value 0.05392
scoring_system epss
scoring_elements 0.90121
published_at 2026-04-09T12:55:00Z
6
value 0.05392
scoring_system epss
scoring_elements 0.90129
published_at 2026-04-11T12:55:00Z
7
value 0.05392
scoring_system epss
scoring_elements 0.90128
published_at 2026-04-12T12:55:00Z
8
value 0.05392
scoring_system epss
scoring_elements 0.90122
published_at 2026-04-13T12:55:00Z
9
value 0.05392
scoring_system epss
scoring_elements 0.9014
published_at 2026-04-18T12:55:00Z
10
value 0.05392
scoring_system epss
scoring_elements 0.90136
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1888
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1888
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=506996
reference_id 506996
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=506996
4
reference_url https://access.redhat.com/errata/RHSA-2009:1529
reference_id RHSA-2009:1529
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1529
5
reference_url https://access.redhat.com/errata/RHSA-2009:1585
reference_id RHSA-2009:1585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1585
6
reference_url https://usn.ubuntu.com/839-1/
reference_id USN-839-1
reference_type
scores
url https://usn.ubuntu.com/839-1/
fixed_packages
0
url pkg:deb/debian/samba@2:3.3.6-1?distro=trixie
purl pkg:deb/debian/samba@2:3.3.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:3.3.6-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2009-1888
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h4br-qmyf-pug1
103
url VCID-he7x-3928-fffk
vulnerability_id VCID-he7x-3928-fffk
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16857.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16857.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-16857
reference_id
reference_type
scores
0
value 0.0224
scoring_system epss
scoring_elements 0.84483
published_at 2026-04-01T12:55:00Z
1
value 0.0224
scoring_system epss
scoring_elements 0.84581
published_at 2026-04-21T12:55:00Z
2
value 0.0224
scoring_system epss
scoring_elements 0.84579
published_at 2026-04-16T12:55:00Z
3
value 0.0224
scoring_system epss
scoring_elements 0.8458
published_at 2026-04-18T12:55:00Z
4
value 0.0224
scoring_system epss
scoring_elements 0.84498
published_at 2026-04-02T12:55:00Z
5
value 0.0224
scoring_system epss
scoring_elements 0.8452
published_at 2026-04-04T12:55:00Z
6
value 0.0224
scoring_system epss
scoring_elements 0.84522
published_at 2026-04-07T12:55:00Z
7
value 0.0224
scoring_system epss
scoring_elements 0.84544
published_at 2026-04-08T12:55:00Z
8
value 0.0224
scoring_system epss
scoring_elements 0.84549
published_at 2026-04-09T12:55:00Z
9
value 0.0224
scoring_system epss
scoring_elements 0.84568
published_at 2026-04-11T12:55:00Z
10
value 0.0224
scoring_system epss
scoring_elements 0.84563
published_at 2026-04-12T12:55:00Z
11
value 0.0224
scoring_system epss
scoring_elements 0.84559
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-16857
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16857
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1649278
reference_id 1649278
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1649278
5
reference_url https://security.archlinux.org/ASA-201811-22
reference_id ASA-201811-22
reference_type
scores
url https://security.archlinux.org/ASA-201811-22
6
reference_url https://security.archlinux.org/AVG-823
reference_id AVG-823
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-823
7
reference_url https://security.gentoo.org/glsa/202003-52
reference_id GLSA-202003-52
reference_type
scores
url https://security.gentoo.org/glsa/202003-52
fixed_packages
0
url pkg:deb/debian/samba@2:4.9.2%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.9.2%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.2%252Bdfsg-2%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2018-16857
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-he7x-3928-fffk
104
url VCID-hfsk-4cbd-m3b1
vulnerability_id VCID-hfsk-4cbd-m3b1
summary Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0614.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0614.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0614
reference_id
reference_type
scores
0
value 0.00188
scoring_system epss
scoring_elements 0.40674
published_at 2026-04-18T12:55:00Z
1
value 0.00188
scoring_system epss
scoring_elements 0.40704
published_at 2026-04-16T12:55:00Z
2
value 0.00188
scoring_system epss
scoring_elements 0.40659
published_at 2026-04-13T12:55:00Z
3
value 0.00188
scoring_system epss
scoring_elements 0.40678
published_at 2026-04-12T12:55:00Z
4
value 0.00188
scoring_system epss
scoring_elements 0.40713
published_at 2026-04-11T12:55:00Z
5
value 0.00188
scoring_system epss
scoring_elements 0.40696
published_at 2026-04-09T12:55:00Z
6
value 0.00188
scoring_system epss
scoring_elements 0.40687
published_at 2026-04-08T12:55:00Z
7
value 0.00188
scoring_system epss
scoring_elements 0.40714
published_at 2026-04-04T12:55:00Z
8
value 0.00188
scoring_system epss
scoring_elements 0.40636
published_at 2026-04-07T12:55:00Z
9
value 0.00219
scoring_system epss
scoring_elements 0.44492
published_at 2026-04-21T12:55:00Z
10
value 0.00246
scoring_system epss
scoring_elements 0.47868
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0614
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0614
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2182776
reference_id 2182776
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2182776
5
reference_url https://www.samba.org/samba/security/CVE-2023-0614.html
reference_id CVE-2023-0614.html
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T14:52:15Z/
url https://www.samba.org/samba/security/CVE-2023-0614.html
6
reference_url https://security.gentoo.org/glsa/202309-06
reference_id GLSA-202309-06
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T14:52:15Z/
url https://security.gentoo.org/glsa/202309-06
7
reference_url https://security.netapp.com/advisory/ntap-20230406-0007/
reference_id ntap-20230406-0007
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T14:52:15Z/
url https://security.netapp.com/advisory/ntap-20230406-0007/
8
reference_url https://usn.ubuntu.com/5992-1/
reference_id USN-5992-1
reference_type
scores
url https://usn.ubuntu.com/5992-1/
9
reference_url https://usn.ubuntu.com/5993-1/
reference_id USN-5993-1
reference_type
scores
url https://usn.ubuntu.com/5993-1/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YXBPYIA4VWNOD437NAHZ3NXKAETLFB5S/
reference_id YXBPYIA4VWNOD437NAHZ3NXKAETLFB5S
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T14:52:15Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YXBPYIA4VWNOD437NAHZ3NXKAETLFB5S/
fixed_packages
0
url pkg:deb/debian/samba@2:4.17.7%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.17.7%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.7%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2023-0614
risk_score 3.5
exploitability 0.5
weighted_severity 6.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hfsk-4cbd-m3b1
105
url VCID-hnhm-ud2a-nugz
vulnerability_id VCID-hnhm-ud2a-nugz
summary Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25722.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25722.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-25722
reference_id
reference_type
scores
0
value 0.00411
scoring_system epss
scoring_elements 0.61427
published_at 2026-04-21T12:55:00Z
1
value 0.00411
scoring_system epss
scoring_elements 0.61435
published_at 2026-04-11T12:55:00Z
2
value 0.00411
scoring_system epss
scoring_elements 0.6142
published_at 2026-04-12T12:55:00Z
3
value 0.00411
scoring_system epss
scoring_elements 0.61401
published_at 2026-04-13T12:55:00Z
4
value 0.00411
scoring_system epss
scoring_elements 0.61439
published_at 2026-04-16T12:55:00Z
5
value 0.00411
scoring_system epss
scoring_elements 0.61443
published_at 2026-04-18T12:55:00Z
6
value 0.00411
scoring_system epss
scoring_elements 0.61351
published_at 2026-04-07T12:55:00Z
7
value 0.00411
scoring_system epss
scoring_elements 0.61398
published_at 2026-04-08T12:55:00Z
8
value 0.00411
scoring_system epss
scoring_elements 0.61414
published_at 2026-04-09T12:55:00Z
9
value 0.00412
scoring_system epss
scoring_elements 0.61415
published_at 2026-04-02T12:55:00Z
10
value 0.00412
scoring_system epss
scoring_elements 0.61443
published_at 2026-04-04T12:55:00Z
11
value 0.00412
scoring_system epss
scoring_elements 0.61338
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-25722
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2019764
reference_id 2019764
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2019764
12
reference_url https://security.archlinux.org/AVG-2538
reference_id AVG-2538
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2538
13
reference_url https://security.gentoo.org/glsa/202309-06
reference_id GLSA-202309-06
reference_type
scores
url https://security.gentoo.org/glsa/202309-06
14
reference_url https://usn.ubuntu.com/5142-1/
reference_id USN-5142-1
reference_type
scores
url https://usn.ubuntu.com/5142-1/
15
reference_url https://usn.ubuntu.com/5174-1/
reference_id USN-5174-1
reference_type
scores
url https://usn.ubuntu.com/5174-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u2?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u2%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.13.14%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.13.14%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.14%252Bdfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
6
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2020-25722
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hnhm-ud2a-nugz
106
url VCID-hry8-y29y-x3h2
vulnerability_id VCID-hry8-y29y-x3h2
summary Multiple vulnerabilities have been discovered in Samba, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3961.json
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3961.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3961
reference_id
reference_type
scores
0
value 0.01941
scoring_system epss
scoring_elements 0.83375
published_at 2026-04-02T12:55:00Z
1
value 0.01941
scoring_system epss
scoring_elements 0.8339
published_at 2026-04-04T12:55:00Z
2
value 0.01941
scoring_system epss
scoring_elements 0.83389
published_at 2026-04-07T12:55:00Z
3
value 0.01941
scoring_system epss
scoring_elements 0.83414
published_at 2026-04-08T12:55:00Z
4
value 0.01941
scoring_system epss
scoring_elements 0.83424
published_at 2026-04-09T12:55:00Z
5
value 0.01941
scoring_system epss
scoring_elements 0.83439
published_at 2026-04-11T12:55:00Z
6
value 0.01941
scoring_system epss
scoring_elements 0.83433
published_at 2026-04-12T12:55:00Z
7
value 0.01941
scoring_system epss
scoring_elements 0.83428
published_at 2026-04-13T12:55:00Z
8
value 0.01941
scoring_system epss
scoring_elements 0.83464
published_at 2026-04-16T12:55:00Z
9
value 0.01941
scoring_system epss
scoring_elements 0.83465
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3961
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2241881
reference_id 2241881
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2241881
4
reference_url https://security.gentoo.org/glsa/202402-28
reference_id GLSA-202402-28
reference_type
scores
url https://security.gentoo.org/glsa/202402-28
5
reference_url https://access.redhat.com/errata/RHSA-2023:6209
reference_id RHSA-2023:6209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6209
6
reference_url https://access.redhat.com/errata/RHSA-2023:6744
reference_id RHSA-2023:6744
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6744
7
reference_url https://access.redhat.com/errata/RHSA-2023:7371
reference_id RHSA-2023:7371
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7371
8
reference_url https://access.redhat.com/errata/RHSA-2023:7408
reference_id RHSA-2023:7408
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7408
9
reference_url https://access.redhat.com/errata/RHSA-2023:7464
reference_id RHSA-2023:7464
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7464
10
reference_url https://access.redhat.com/errata/RHSA-2023:7467
reference_id RHSA-2023:7467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7467
fixed_packages
0
url pkg:deb/debian/samba@0?distro=trixie
purl pkg:deb/debian/samba@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@0%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.19.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.19.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.19.1%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
7
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2023-3961
risk_score 4.1
exploitability 0.5
weighted_severity 8.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hry8-y29y-x3h2
107
url VCID-hzy4-16j5-8qcf
vulnerability_id VCID-hzy4-16j5-8qcf
summary Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2031.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2031.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2031
reference_id
reference_type
scores
0
value 0.00323
scoring_system epss
scoring_elements 0.5542
published_at 2026-04-16T12:55:00Z
1
value 0.00323
scoring_system epss
scoring_elements 0.55424
published_at 2026-04-18T12:55:00Z
2
value 0.00323
scoring_system epss
scoring_elements 0.55403
published_at 2026-04-21T12:55:00Z
3
value 0.00323
scoring_system epss
scoring_elements 0.55384
published_at 2026-04-13T12:55:00Z
4
value 0.00323
scoring_system epss
scoring_elements 0.55385
published_at 2026-04-04T12:55:00Z
5
value 0.00323
scoring_system epss
scoring_elements 0.55363
published_at 2026-04-07T12:55:00Z
6
value 0.00323
scoring_system epss
scoring_elements 0.55414
published_at 2026-04-09T12:55:00Z
7
value 0.00422
scoring_system epss
scoring_elements 0.62033
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2031
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449
reference_id 1016449
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2094789
reference_id 2094789
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2094789
10
reference_url https://security.archlinux.org/AVG-2782
reference_id AVG-2782
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2782
11
reference_url https://security.gentoo.org/glsa/202309-06
reference_id GLSA-202309-06
reference_type
scores
url https://security.gentoo.org/glsa/202309-06
12
reference_url https://usn.ubuntu.com/5542-1/
reference_id USN-5542-1
reference_type
scores
url https://usn.ubuntu.com/5542-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u5?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u5%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.16.4%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.16.4%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.16.4%252Bdfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
6
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2022-2031
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hzy4-16j5-8qcf
108
url VCID-j2dm-xqma-7ybw
vulnerability_id VCID-j2dm-xqma-7ybw
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which may allow execution of arbitrary code with root privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2906.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2906.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-2906
reference_id
reference_type
scores
0
value 0.00397
scoring_system epss
scoring_elements 0.60362
published_at 2026-04-01T12:55:00Z
1
value 0.00397
scoring_system epss
scoring_elements 0.60438
published_at 2026-04-02T12:55:00Z
2
value 0.00397
scoring_system epss
scoring_elements 0.60465
published_at 2026-04-04T12:55:00Z
3
value 0.00397
scoring_system epss
scoring_elements 0.60433
published_at 2026-04-07T12:55:00Z
4
value 0.00397
scoring_system epss
scoring_elements 0.60482
published_at 2026-04-08T12:55:00Z
5
value 0.00397
scoring_system epss
scoring_elements 0.60498
published_at 2026-04-09T12:55:00Z
6
value 0.00397
scoring_system epss
scoring_elements 0.60518
published_at 2026-04-11T12:55:00Z
7
value 0.00397
scoring_system epss
scoring_elements 0.60505
published_at 2026-04-12T12:55:00Z
8
value 0.00397
scoring_system epss
scoring_elements 0.60484
published_at 2026-04-13T12:55:00Z
9
value 0.00397
scoring_system epss
scoring_elements 0.60526
published_at 2026-04-16T12:55:00Z
10
value 0.00397
scoring_system epss
scoring_elements 0.60534
published_at 2026-04-18T12:55:00Z
11
value 0.00397
scoring_system epss
scoring_elements 0.60523
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-2906
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2906
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2906
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=526645
reference_id 526645
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=526645
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=550423
reference_id 550423
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=550423
5
reference_url https://security.gentoo.org/glsa/201206-22
reference_id GLSA-201206-22
reference_type
scores
url https://security.gentoo.org/glsa/201206-22
6
reference_url https://access.redhat.com/errata/RHSA-2009:1528
reference_id RHSA-2009:1528
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1528
7
reference_url https://access.redhat.com/errata/RHSA-2009:1529
reference_id RHSA-2009:1529
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1529
8
reference_url https://access.redhat.com/errata/RHSA-2009:1585
reference_id RHSA-2009:1585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1585
9
reference_url https://usn.ubuntu.com/839-1/
reference_id USN-839-1
reference_type
scores
url https://usn.ubuntu.com/839-1/
fixed_packages
0
url pkg:deb/debian/samba@2:3.4.2-1?distro=trixie
purl pkg:deb/debian/samba@2:3.4.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:3.4.2-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2009-2906
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j2dm-xqma-7ybw
109
url VCID-j9a3-25xa-c3g3
vulnerability_id VCID-j9a3-25xa-c3g3
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12151.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12151.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12151
reference_id
reference_type
scores
0
value 0.04146
scoring_system epss
scoring_elements 0.88606
published_at 2026-04-01T12:55:00Z
1
value 0.04146
scoring_system epss
scoring_elements 0.8867
published_at 2026-04-21T12:55:00Z
2
value 0.04146
scoring_system epss
scoring_elements 0.88675
published_at 2026-04-16T12:55:00Z
3
value 0.04146
scoring_system epss
scoring_elements 0.88671
published_at 2026-04-18T12:55:00Z
4
value 0.04146
scoring_system epss
scoring_elements 0.88615
published_at 2026-04-02T12:55:00Z
5
value 0.04146
scoring_system epss
scoring_elements 0.88631
published_at 2026-04-04T12:55:00Z
6
value 0.04146
scoring_system epss
scoring_elements 0.88633
published_at 2026-04-07T12:55:00Z
7
value 0.04146
scoring_system epss
scoring_elements 0.88651
published_at 2026-04-08T12:55:00Z
8
value 0.04146
scoring_system epss
scoring_elements 0.88656
published_at 2026-04-09T12:55:00Z
9
value 0.04146
scoring_system epss
scoring_elements 0.88668
published_at 2026-04-11T12:55:00Z
10
value 0.04146
scoring_system epss
scoring_elements 0.88661
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12151
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12150
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12150
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12151
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12163
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12163
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv2
scoring_elements AV:A/AC:M/Au:N/C:C/I:C/A:N
1
value 8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1488197
reference_id 1488197
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1488197
7
reference_url https://access.redhat.com/errata/RHSA-2017:2790
reference_id RHSA-2017:2790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2790
8
reference_url https://access.redhat.com/errata/RHSA-2017:2858
reference_id RHSA-2017:2858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2858
9
reference_url https://usn.ubuntu.com/3426-1/
reference_id USN-3426-1
reference_type
scores
url https://usn.ubuntu.com/3426-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.6.7%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.6.7%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.6.7%252Bdfsg-2%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2017-12151
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j9a3-25xa-c3g3
110
url VCID-jc62-j5kx-hqdc
vulnerability_id VCID-jc62-j5kx-hqdc
summary security update
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0279.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0279.html
1
reference_url http://linux.oracle.com/errata/ELSA-2014-0866.html
reference_id
reference_type
scores
url http://linux.oracle.com/errata/ELSA-2014-0866.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2014-0866.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-0866.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0244.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0244.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-0244
reference_id
reference_type
scores
0
value 0.20011
scoring_system epss
scoring_elements 0.95486
published_at 2026-04-21T12:55:00Z
1
value 0.20011
scoring_system epss
scoring_elements 0.95436
published_at 2026-04-01T12:55:00Z
2
value 0.20011
scoring_system epss
scoring_elements 0.95445
published_at 2026-04-02T12:55:00Z
3
value 0.20011
scoring_system epss
scoring_elements 0.95451
published_at 2026-04-04T12:55:00Z
4
value 0.20011
scoring_system epss
scoring_elements 0.95454
published_at 2026-04-07T12:55:00Z
5
value 0.20011
scoring_system epss
scoring_elements 0.9546
published_at 2026-04-08T12:55:00Z
6
value 0.20011
scoring_system epss
scoring_elements 0.95463
published_at 2026-04-09T12:55:00Z
7
value 0.20011
scoring_system epss
scoring_elements 0.95468
published_at 2026-04-12T12:55:00Z
8
value 0.20011
scoring_system epss
scoring_elements 0.95469
published_at 2026-04-13T12:55:00Z
9
value 0.20011
scoring_system epss
scoring_elements 0.95478
published_at 2026-04-16T12:55:00Z
10
value 0.20011
scoring_system epss
scoring_elements 0.95482
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-0244
7
reference_url https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_samba1
reference_id
reference_type
scores
url https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_samba1
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0178
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0244
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3493
11
reference_url http://secunia.com/advisories/59378
reference_id
reference_type
scores
url http://secunia.com/advisories/59378
12
reference_url http://secunia.com/advisories/59407
reference_id
reference_type
scores
url http://secunia.com/advisories/59407
13
reference_url http://secunia.com/advisories/59433
reference_id
reference_type
scores
url http://secunia.com/advisories/59433
14
reference_url http://secunia.com/advisories/59579
reference_id
reference_type
scores
url http://secunia.com/advisories/59579
15
reference_url http://secunia.com/advisories/59834
reference_id
reference_type
scores
url http://secunia.com/advisories/59834
16
reference_url http://secunia.com/advisories/59848
reference_id
reference_type
scores
url http://secunia.com/advisories/59848
17
reference_url http://secunia.com/advisories/59919
reference_id
reference_type
scores
url http://secunia.com/advisories/59919
18
reference_url http://secunia.com/advisories/61218
reference_id
reference_type
scores
url http://secunia.com/advisories/61218
19
reference_url http://security.gentoo.org/glsa/glsa-201502-15.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201502-15.xml
20
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993
21
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2014:136
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2014:136
22
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:082
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:082
23
reference_url http://www.samba.org/samba/security/CVE-2014-0244
reference_id
reference_type
scores
url http://www.samba.org/samba/security/CVE-2014-0244
24
reference_url http://www.securityfocus.com/archive/1/532757/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/532757/100/0/threaded
25
reference_url http://www.securityfocus.com/bid/68148
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/68148
26
reference_url http://www.securitytracker.com/id/1030455
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030455
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1097815
reference_id 1097815
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1097815
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-0244
reference_id CVE-2014-0244
reference_type
scores
0
value 3.3
scoring_system cvssv2
scoring_elements AV:A/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-0244
81
reference_url https://security.gentoo.org/glsa/201502-15
reference_id GLSA-201502-15
reference_type
scores
url https://security.gentoo.org/glsa/201502-15
82
reference_url https://access.redhat.com/errata/RHSA-2014:0866
reference_id RHSA-2014:0866
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0866
83
reference_url https://access.redhat.com/errata/RHSA-2014:0867
reference_id RHSA-2014:0867
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0867
84
reference_url https://access.redhat.com/errata/RHSA-2014:1009
reference_id RHSA-2014:1009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1009
85
reference_url https://usn.ubuntu.com/2257-1/
reference_id USN-2257-1
reference_type
scores
url https://usn.ubuntu.com/2257-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.1.9%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.1.9%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.1.9%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2014-0244
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jc62-j5kx-hqdc
111
url VCID-jd7n-tjpq-3uc9
vulnerability_id VCID-jd7n-tjpq-3uc9
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which may allow execution of arbitrary code with root privileges.
references
0
reference_url http://badlock.org/
reference_id
reference_type
scores
url http://badlock.org/
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html
10
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html
11
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html
12
reference_url http://rhn.redhat.com/errata/RHSA-2016-0611.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0611.html
13
reference_url http://rhn.redhat.com/errata/RHSA-2016-0612.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0612.html
14
reference_url http://rhn.redhat.com/errata/RHSA-2016-0613.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0613.html
15
reference_url http://rhn.redhat.com/errata/RHSA-2016-0614.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0614.html
16
reference_url http://rhn.redhat.com/errata/RHSA-2016-0618.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0618.html
17
reference_url http://rhn.redhat.com/errata/RHSA-2016-0619.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0619.html
18
reference_url http://rhn.redhat.com/errata/RHSA-2016-0620.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0620.html
19
reference_url http://rhn.redhat.com/errata/RHSA-2016-0621.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0621.html
20
reference_url http://rhn.redhat.com/errata/RHSA-2016-0623.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0623.html
21
reference_url http://rhn.redhat.com/errata/RHSA-2016-0624.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0624.html
22
reference_url http://rhn.redhat.com/errata/RHSA-2016-0625.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0625.html
23
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2118.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2118.json
24
reference_url https://access.redhat.com/security/vulnerabilities/badlock
reference_id
reference_type
scores
url https://access.redhat.com/security/vulnerabilities/badlock
25
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2118
reference_id
reference_type
scores
0
value 0.78522
scoring_system epss
scoring_elements 0.99042
published_at 2026-04-21T12:55:00Z
1
value 0.78522
scoring_system epss
scoring_elements 0.99039
published_at 2026-04-16T12:55:00Z
2
value 0.78522
scoring_system epss
scoring_elements 0.9904
published_at 2026-04-18T12:55:00Z
3
value 0.78522
scoring_system epss
scoring_elements 0.99028
published_at 2026-04-01T12:55:00Z
4
value 0.78522
scoring_system epss
scoring_elements 0.99029
published_at 2026-04-02T12:55:00Z
5
value 0.78522
scoring_system epss
scoring_elements 0.99032
published_at 2026-04-04T12:55:00Z
6
value 0.78522
scoring_system epss
scoring_elements 0.99034
published_at 2026-04-07T12:55:00Z
7
value 0.78522
scoring_system epss
scoring_elements 0.99035
published_at 2026-04-08T12:55:00Z
8
value 0.78522
scoring_system epss
scoring_elements 0.99036
published_at 2026-04-09T12:55:00Z
9
value 0.78522
scoring_system epss
scoring_elements 0.99037
published_at 2026-04-11T12:55:00Z
10
value 0.78522
scoring_system epss
scoring_elements 0.99038
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2118
26
reference_url https://bto.bluecoat.com/security-advisory/sa122
reference_id
reference_type
scores
url https://bto.bluecoat.com/security-advisory/sa122
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2114
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2114
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118
35
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
36
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399
37
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05166182
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05166182
38
reference_url https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
reference_id
reference_type
scores
url https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
39
reference_url https://kb.netapp.com/support/s/article/ka51A0000008SXzQAM/smb-vulnerabilities-in-multiple-netapp-products
reference_id
reference_type
scores
url https://kb.netapp.com/support/s/article/ka51A0000008SXzQAM/smb-vulnerabilities-in-multiple-netapp-products
40
reference_url https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40196
reference_id
reference_type
scores
url https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40196
41
reference_url https://www.kb.cert.org/vuls/id/813296
reference_id
reference_type
scores
url https://www.kb.cert.org/vuls/id/813296
42
reference_url https://www.samba.org/samba/history/samba-4.2.10.html
reference_id
reference_type
scores
url https://www.samba.org/samba/history/samba-4.2.10.html
43
reference_url https://www.samba.org/samba/latest_news.html#4.4.2
reference_id
reference_type
scores
url https://www.samba.org/samba/latest_news.html#4.4.2
44
reference_url https://www.samba.org/samba/security/CVE-2016-2118.html
reference_id
reference_type
scores
url https://www.samba.org/samba/security/CVE-2016-2118.html
45
reference_url http://www.debian.org/security/2016/dsa-3548
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3548
46
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
47
reference_url http://www.securityfocus.com/bid/86002
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/86002
48
reference_url http://www.securitytracker.com/id/1035533
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035533
49
reference_url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.458012
reference_id
reference_type
scores
url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.458012
50
reference_url http://www.ubuntu.com/usn/USN-2950-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2950-1
51
reference_url http://www.ubuntu.com/usn/USN-2950-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2950-2
52
reference_url http://www.ubuntu.com/usn/USN-2950-3
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2950-3
53
reference_url http://www.ubuntu.com/usn/USN-2950-4
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2950-4
54
reference_url http://www.ubuntu.com/usn/USN-2950-5
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2950-5
55
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1317990
reference_id 1317990
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1317990
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-2118
reference_id CVE-2016-2118
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-2118
66
reference_url https://security.gentoo.org/glsa/201612-47
reference_id GLSA-201612-47
reference_type
scores
url https://security.gentoo.org/glsa/201612-47
67
reference_url https://access.redhat.com/errata/RHSA-2016:0611
reference_id RHSA-2016:0611
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0611
68
reference_url https://access.redhat.com/errata/RHSA-2016:0612
reference_id RHSA-2016:0612
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0612
69
reference_url https://access.redhat.com/errata/RHSA-2016:0613
reference_id RHSA-2016:0613
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0613
70
reference_url https://access.redhat.com/errata/RHSA-2016:0614
reference_id RHSA-2016:0614
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0614
71
reference_url https://access.redhat.com/errata/RHSA-2016:0618
reference_id RHSA-2016:0618
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0618
72
reference_url https://access.redhat.com/errata/RHSA-2016:0619
reference_id RHSA-2016:0619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0619
73
reference_url https://access.redhat.com/errata/RHSA-2016:0620
reference_id RHSA-2016:0620
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0620
74
reference_url https://access.redhat.com/errata/RHSA-2016:0621
reference_id RHSA-2016:0621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0621
75
reference_url https://access.redhat.com/errata/RHSA-2016:0623
reference_id RHSA-2016:0623
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0623
76
reference_url https://access.redhat.com/errata/RHSA-2016:0624
reference_id RHSA-2016:0624
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0624
77
reference_url https://access.redhat.com/errata/RHSA-2016:0625
reference_id RHSA-2016:0625
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0625
78
reference_url https://usn.ubuntu.com/2950-1/
reference_id USN-2950-1
reference_type
scores
url https://usn.ubuntu.com/2950-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.3.7%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.3.7%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.3.7%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2016-2118
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jd7n-tjpq-3uc9
112
url VCID-jdu1-822a-rkbu
vulnerability_id VCID-jdu1-822a-rkbu
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which allowing a context-dependent attacker to bypass intended file
    restrictions, cause a Denial of Service or execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4496.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4496.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4496
reference_id
reference_type
scores
0
value 0.0555
scoring_system epss
scoring_elements 0.90228
published_at 2026-04-01T12:55:00Z
1
value 0.0555
scoring_system epss
scoring_elements 0.90231
published_at 2026-04-02T12:55:00Z
2
value 0.0555
scoring_system epss
scoring_elements 0.90244
published_at 2026-04-04T12:55:00Z
3
value 0.0555
scoring_system epss
scoring_elements 0.90248
published_at 2026-04-07T12:55:00Z
4
value 0.0555
scoring_system epss
scoring_elements 0.90264
published_at 2026-04-08T12:55:00Z
5
value 0.0555
scoring_system epss
scoring_elements 0.9027
published_at 2026-04-09T12:55:00Z
6
value 0.0555
scoring_system epss
scoring_elements 0.90279
published_at 2026-04-11T12:55:00Z
7
value 0.0555
scoring_system epss
scoring_elements 0.90278
published_at 2026-04-12T12:55:00Z
8
value 0.0555
scoring_system epss
scoring_elements 0.90272
published_at 2026-04-13T12:55:00Z
9
value 0.0555
scoring_system epss
scoring_elements 0.90289
published_at 2026-04-18T12:55:00Z
10
value 0.0555
scoring_system epss
scoring_elements 0.90285
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4496
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4496
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4496
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1072792
reference_id 1072792
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1072792
4
reference_url https://security.gentoo.org/glsa/201502-15
reference_id GLSA-201502-15
reference_type
scores
url https://security.gentoo.org/glsa/201502-15
5
reference_url https://access.redhat.com/errata/RHSA-2014:0330
reference_id RHSA-2014:0330
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0330
6
reference_url https://access.redhat.com/errata/RHSA-2014:0383
reference_id RHSA-2014:0383
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0383
7
reference_url https://usn.ubuntu.com/2156-1/
reference_id USN-2156-1
reference_type
scores
url https://usn.ubuntu.com/2156-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.1.6%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.1.6%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.1.6%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2013-4496
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jdu1-822a-rkbu
113
url VCID-kbtz-afsp-g3cj
vulnerability_id VCID-kbtz-afsp-g3cj
summary Stack-based buffer overflow in the reply_nttrans function in Samba 2.2.7a and earlier allows remote attackers to execute arbitrary code via a crafted request, a different vulnerability than CVE-2003-0201.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2003-1332
reference_id
reference_type
scores
0
value 0.06492
scoring_system epss
scoring_elements 0.91047
published_at 2026-04-01T12:55:00Z
1
value 0.06492
scoring_system epss
scoring_elements 0.91052
published_at 2026-04-02T12:55:00Z
2
value 0.06492
scoring_system epss
scoring_elements 0.91061
published_at 2026-04-04T12:55:00Z
3
value 0.06492
scoring_system epss
scoring_elements 0.9107
published_at 2026-04-07T12:55:00Z
4
value 0.06492
scoring_system epss
scoring_elements 0.91082
published_at 2026-04-08T12:55:00Z
5
value 0.06492
scoring_system epss
scoring_elements 0.91088
published_at 2026-04-09T12:55:00Z
6
value 0.06492
scoring_system epss
scoring_elements 0.91097
published_at 2026-04-11T12:55:00Z
7
value 0.06492
scoring_system epss
scoring_elements 0.91098
published_at 2026-04-13T12:55:00Z
8
value 0.06492
scoring_system epss
scoring_elements 0.91122
published_at 2026-04-16T12:55:00Z
9
value 0.06492
scoring_system epss
scoring_elements 0.91121
published_at 2026-04-18T12:55:00Z
10
value 0.06492
scoring_system epss
scoring_elements 0.91125
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2003-1332
fixed_packages
0
url pkg:deb/debian/samba@0?distro=trixie
purl pkg:deb/debian/samba@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@0%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2003-1332
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kbtz-afsp-g3cj
114
url VCID-kkgp-9x4z-gue3
vulnerability_id VCID-kkgp-9x4z-gue3
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which may allow execution of arbitrary code with root privileges.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174076.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174076.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174391.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174391.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00002.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html
10
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html
11
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5296.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5296.json
12
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5296
reference_id
reference_type
scores
0
value 0.03652
scoring_system epss
scoring_elements 0.87883
published_at 2026-04-21T12:55:00Z
1
value 0.03652
scoring_system epss
scoring_elements 0.87886
published_at 2026-04-16T12:55:00Z
2
value 0.03652
scoring_system epss
scoring_elements 0.87884
published_at 2026-04-18T12:55:00Z
3
value 0.03652
scoring_system epss
scoring_elements 0.87815
published_at 2026-04-01T12:55:00Z
4
value 0.03652
scoring_system epss
scoring_elements 0.87825
published_at 2026-04-02T12:55:00Z
5
value 0.03652
scoring_system epss
scoring_elements 0.87836
published_at 2026-04-04T12:55:00Z
6
value 0.03652
scoring_system epss
scoring_elements 0.87839
published_at 2026-04-07T12:55:00Z
7
value 0.03652
scoring_system epss
scoring_elements 0.87861
published_at 2026-04-08T12:55:00Z
8
value 0.03652
scoring_system epss
scoring_elements 0.87868
published_at 2026-04-09T12:55:00Z
9
value 0.03652
scoring_system epss
scoring_elements 0.87879
published_at 2026-04-11T12:55:00Z
10
value 0.03652
scoring_system epss
scoring_elements 0.87872
published_at 2026-04-12T12:55:00Z
11
value 0.03652
scoring_system epss
scoring_elements 0.87871
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5296
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3223
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3223
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5252
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5252
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5296
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5299
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5330
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5330
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7540
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7540
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8467
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8467
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.2
scoring_system cvssv2
scoring_elements AV:A/AC:H/Au:N/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=1ba49b8f389eda3414b14410c7fbcb4041ca06b1
reference_id
reference_type
scores
url https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=1ba49b8f389eda3414b14410c7fbcb4041ca06b1
22
reference_url https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=a819d2b440aafa3138d95ff6e8b824da885a70e9
reference_id
reference_type
scores
url https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=a819d2b440aafa3138d95ff6e8b824da885a70e9
23
reference_url https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=d724f835acb9f4886c0001af32cd325dbbf1f895
reference_id
reference_type
scores
url https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=d724f835acb9f4886c0001af32cd325dbbf1f895
24
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993
25
reference_url https://www.samba.org/samba/security/CVE-2015-5296.html
reference_id
reference_type
scores
url https://www.samba.org/samba/security/CVE-2015-5296.html
26
reference_url http://www.debian.org/security/2016/dsa-3433
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3433
27
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
28
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
29
reference_url http://www.securityfocus.com/bid/79732
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79732
30
reference_url http://www.securitytracker.com/id/1034493
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034493
31
reference_url http://www.ubuntu.com/usn/USN-2855-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2855-1
32
reference_url http://www.ubuntu.com/usn/USN-2855-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2855-2
33
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1290292
reference_id 1290292
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1290292
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-5296
reference_id CVE-2015-5296
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-5296
42
reference_url https://security.gentoo.org/glsa/201612-47
reference_id GLSA-201612-47
reference_type
scores
url https://security.gentoo.org/glsa/201612-47
43
reference_url https://access.redhat.com/errata/RHSA-2016:0006
reference_id RHSA-2016:0006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0006
44
reference_url https://access.redhat.com/errata/RHSA-2016:0010
reference_id RHSA-2016:0010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0010
45
reference_url https://access.redhat.com/errata/RHSA-2016:0011
reference_id RHSA-2016:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0011
46
reference_url https://access.redhat.com/errata/RHSA-2016:0015
reference_id RHSA-2016:0015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0015
47
reference_url https://access.redhat.com/errata/RHSA-2016:0016
reference_id RHSA-2016:0016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0016
48
reference_url https://usn.ubuntu.com/2855-1/
reference_id USN-2855-1
reference_type
scores
url https://usn.ubuntu.com/2855-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.1.22%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.1.22%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.1.22%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2015-5296
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kkgp-9x4z-gue3
115
url VCID-kkwp-2x9m-9bgd
vulnerability_id VCID-kkwp-2x9m-9bgd
summary samba: check attribute access rights for LDAP adds of computers
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25720.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25720.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-25720
reference_id
reference_type
scores
0
value 0.00281
scoring_system epss
scoring_elements 0.51383
published_at 2026-04-07T12:55:00Z
1
value 0.00281
scoring_system epss
scoring_elements 0.51347
published_at 2026-04-01T12:55:00Z
2
value 0.00281
scoring_system epss
scoring_elements 0.51397
published_at 2026-04-02T12:55:00Z
3
value 0.00281
scoring_system epss
scoring_elements 0.51424
published_at 2026-04-04T12:55:00Z
4
value 0.00292
scoring_system epss
scoring_elements 0.52591
published_at 2026-04-16T12:55:00Z
5
value 0.00292
scoring_system epss
scoring_elements 0.52583
published_at 2026-04-21T12:55:00Z
6
value 0.00292
scoring_system epss
scoring_elements 0.52598
published_at 2026-04-18T12:55:00Z
7
value 0.00381
scoring_system epss
scoring_elements 0.59546
published_at 2026-04-08T12:55:00Z
8
value 0.00381
scoring_system epss
scoring_elements 0.59559
published_at 2026-04-09T12:55:00Z
9
value 0.00381
scoring_system epss
scoring_elements 0.59577
published_at 2026-04-11T12:55:00Z
10
value 0.00381
scoring_system epss
scoring_elements 0.59561
published_at 2026-04-12T12:55:00Z
11
value 0.00381
scoring_system epss
scoring_elements 0.59542
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-25720
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25720
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2305954
reference_id 2305954
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-17T16:18:39Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2305954
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:storage:3
reference_id cpe:/a:redhat:storage:3
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:storage:3
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
12
reference_url https://access.redhat.com/security/cve/CVE-2020-25720
reference_id CVE-2020-25720
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-17T16:18:39Z/
url https://access.redhat.com/security/cve/CVE-2020-25720
fixed_packages
0
url pkg:deb/debian/samba@2:4.17.8%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.17.8%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.8%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2020-25720
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kkwp-2x9m-9bgd
116
url VCID-ky5x-ujtx-fbe6
vulnerability_id VCID-ky5x-ujtx-fbe6
summary security update
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0279.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0279.html
1
reference_url http://linux.oracle.com/errata/ELSA-2014-0866.html
reference_id
reference_type
scores
url http://linux.oracle.com/errata/ELSA-2014-0866.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2014-0866.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-0866.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3493.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3493.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3493
reference_id
reference_type
scores
0
value 0.02413
scoring_system epss
scoring_elements 0.85128
published_at 2026-04-18T12:55:00Z
1
value 0.02413
scoring_system epss
scoring_elements 0.8503
published_at 2026-04-01T12:55:00Z
2
value 0.02413
scoring_system epss
scoring_elements 0.85043
published_at 2026-04-02T12:55:00Z
3
value 0.02413
scoring_system epss
scoring_elements 0.8506
published_at 2026-04-04T12:55:00Z
4
value 0.02413
scoring_system epss
scoring_elements 0.85064
published_at 2026-04-07T12:55:00Z
5
value 0.02413
scoring_system epss
scoring_elements 0.85086
published_at 2026-04-08T12:55:00Z
6
value 0.02413
scoring_system epss
scoring_elements 0.85094
published_at 2026-04-09T12:55:00Z
7
value 0.02413
scoring_system epss
scoring_elements 0.85109
published_at 2026-04-11T12:55:00Z
8
value 0.02413
scoring_system epss
scoring_elements 0.85107
published_at 2026-04-12T12:55:00Z
9
value 0.02413
scoring_system epss
scoring_elements 0.85104
published_at 2026-04-13T12:55:00Z
10
value 0.02413
scoring_system epss
scoring_elements 0.85125
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3493
7
reference_url https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_samba1
reference_id
reference_type
scores
url https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_samba1
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0178
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0244
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3493
11
reference_url http://secunia.com/advisories/59378
reference_id
reference_type
scores
url http://secunia.com/advisories/59378
12
reference_url http://secunia.com/advisories/59407
reference_id
reference_type
scores
url http://secunia.com/advisories/59407
13
reference_url http://secunia.com/advisories/59433
reference_id
reference_type
scores
url http://secunia.com/advisories/59433
14
reference_url http://secunia.com/advisories/59579
reference_id
reference_type
scores
url http://secunia.com/advisories/59579
15
reference_url http://secunia.com/advisories/59834
reference_id
reference_type
scores
url http://secunia.com/advisories/59834
16
reference_url http://secunia.com/advisories/59848
reference_id
reference_type
scores
url http://secunia.com/advisories/59848
17
reference_url http://secunia.com/advisories/59919
reference_id
reference_type
scores
url http://secunia.com/advisories/59919
18
reference_url http://secunia.com/advisories/61218
reference_id
reference_type
scores
url http://secunia.com/advisories/61218
19
reference_url http://security.gentoo.org/glsa/glsa-201502-15.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201502-15.xml
20
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993
21
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2014:136
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2014:136
22
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:082
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:082
23
reference_url http://www.samba.org/samba/security/CVE-2014-3493
reference_id
reference_type
scores
url http://www.samba.org/samba/security/CVE-2014-3493
24
reference_url http://www.securityfocus.com/archive/1/532757/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/532757/100/0/threaded
25
reference_url http://www.securityfocus.com/bid/68150
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/68150
26
reference_url http://www.securitytracker.com/id/1030455
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030455
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1108748
reference_id 1108748
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1108748
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3493
reference_id CVE-2014-3493
reference_type
scores
0
value 2.7
scoring_system cvssv2
scoring_elements AV:A/AC:L/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-3493
81
reference_url https://security.gentoo.org/glsa/201502-15
reference_id GLSA-201502-15
reference_type
scores
url https://security.gentoo.org/glsa/201502-15
82
reference_url https://access.redhat.com/errata/RHSA-2014:0866
reference_id RHSA-2014:0866
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0866
83
reference_url https://access.redhat.com/errata/RHSA-2014:0867
reference_id RHSA-2014:0867
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0867
84
reference_url https://access.redhat.com/errata/RHSA-2014:1009
reference_id RHSA-2014:1009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1009
85
reference_url https://usn.ubuntu.com/2257-1/
reference_id USN-2257-1
reference_type
scores
url https://usn.ubuntu.com/2257-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.1.9%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.1.9%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.1.9%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2014-3493
risk_score 1.2
exploitability 0.5
weighted_severity 2.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ky5x-ujtx-fbe6
117
url VCID-m44e-rw2w-vuhj
vulnerability_id VCID-m44e-rw2w-vuhj
summary Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0336.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0336.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-0336
reference_id
reference_type
scores
0
value 0.00382
scoring_system epss
scoring_elements 0.59459
published_at 2026-04-01T12:55:00Z
1
value 0.00382
scoring_system epss
scoring_elements 0.59595
published_at 2026-04-21T12:55:00Z
2
value 0.00382
scoring_system epss
scoring_elements 0.59604
published_at 2026-04-16T12:55:00Z
3
value 0.00382
scoring_system epss
scoring_elements 0.59611
published_at 2026-04-18T12:55:00Z
4
value 0.00382
scoring_system epss
scoring_elements 0.59531
published_at 2026-04-02T12:55:00Z
5
value 0.00382
scoring_system epss
scoring_elements 0.59556
published_at 2026-04-04T12:55:00Z
6
value 0.00382
scoring_system epss
scoring_elements 0.59525
published_at 2026-04-07T12:55:00Z
7
value 0.00382
scoring_system epss
scoring_elements 0.59576
published_at 2026-04-08T12:55:00Z
8
value 0.00382
scoring_system epss
scoring_elements 0.59589
published_at 2026-04-09T12:55:00Z
9
value 0.00382
scoring_system epss
scoring_elements 0.59607
published_at 2026-04-11T12:55:00Z
10
value 0.00382
scoring_system epss
scoring_elements 0.59591
published_at 2026-04-12T12:55:00Z
11
value 0.00382
scoring_system epss
scoring_elements 0.59571
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-0336
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0336
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0336
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004694
reference_id 1004694
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004694
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2046134
reference_id 2046134
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2046134
6
reference_url https://security.archlinux.org/AVG-2648
reference_id AVG-2648
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2648
7
reference_url https://security.gentoo.org/glsa/202309-06
reference_id GLSA-202309-06
reference_type
scores
url https://security.gentoo.org/glsa/202309-06
8
reference_url https://usn.ubuntu.com/5260-1/
reference_id USN-5260-1
reference_type
scores
url https://usn.ubuntu.com/5260-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u3?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u3%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.16.0%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.16.0%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.16.0%252Bdfsg-2%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
6
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2022-0336
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m44e-rw2w-vuhj
118
url VCID-m5m4-8jr4-f3dz
vulnerability_id VCID-m5m4-8jr4-f3dz
summary several
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4408.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4408.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4408
reference_id
reference_type
scores
0
value 0.0295
scoring_system epss
scoring_elements 0.86474
published_at 2026-04-21T12:55:00Z
1
value 0.0295
scoring_system epss
scoring_elements 0.86396
published_at 2026-04-01T12:55:00Z
2
value 0.0295
scoring_system epss
scoring_elements 0.86406
published_at 2026-04-02T12:55:00Z
3
value 0.0295
scoring_system epss
scoring_elements 0.86424
published_at 2026-04-04T12:55:00Z
4
value 0.0295
scoring_system epss
scoring_elements 0.86426
published_at 2026-04-07T12:55:00Z
5
value 0.0295
scoring_system epss
scoring_elements 0.86444
published_at 2026-04-08T12:55:00Z
6
value 0.0295
scoring_system epss
scoring_elements 0.86454
published_at 2026-04-09T12:55:00Z
7
value 0.0295
scoring_system epss
scoring_elements 0.86468
published_at 2026-04-11T12:55:00Z
8
value 0.0295
scoring_system epss
scoring_elements 0.86467
published_at 2026-04-12T12:55:00Z
9
value 0.0295
scoring_system epss
scoring_elements 0.86461
published_at 2026-04-13T12:55:00Z
10
value 0.0295
scoring_system epss
scoring_elements 0.86476
published_at 2026-04-16T12:55:00Z
11
value 0.0295
scoring_system epss
scoring_elements 0.86481
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4408
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4408
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4408
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4475
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:A/AC:H/Au:N/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1018032
reference_id 1018032
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1018032
6
reference_url https://security.gentoo.org/glsa/201502-15
reference_id GLSA-201502-15
reference_type
scores
url https://security.gentoo.org/glsa/201502-15
7
reference_url https://access.redhat.com/errata/RHSA-2013:1805
reference_id RHSA-2013:1805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1805
8
reference_url https://access.redhat.com/errata/RHSA-2013:1806
reference_id RHSA-2013:1806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1806
9
reference_url https://access.redhat.com/errata/RHSA-2014:0009
reference_id RHSA-2014:0009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0009
10
reference_url https://usn.ubuntu.com/2054-1/
reference_id USN-2054-1
reference_type
scores
url https://usn.ubuntu.com/2054-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.0.13%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.0.13%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.0.13%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2013-4408
risk_score 1.7
exploitability 0.5
weighted_severity 3.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m5m4-8jr4-f3dz
119
url VCID-mbcb-7zmf-2yah
vulnerability_id VCID-mbcb-7zmf-2yah
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10858.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10858.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-10858
reference_id
reference_type
scores
0
value 0.0594
scoring_system epss
scoring_elements 0.90591
published_at 2026-04-01T12:55:00Z
1
value 0.0594
scoring_system epss
scoring_elements 0.90595
published_at 2026-04-02T12:55:00Z
2
value 0.0594
scoring_system epss
scoring_elements 0.90605
published_at 2026-04-04T12:55:00Z
3
value 0.0594
scoring_system epss
scoring_elements 0.90613
published_at 2026-04-07T12:55:00Z
4
value 0.0594
scoring_system epss
scoring_elements 0.90624
published_at 2026-04-08T12:55:00Z
5
value 0.0594
scoring_system epss
scoring_elements 0.90629
published_at 2026-04-09T12:55:00Z
6
value 0.0594
scoring_system epss
scoring_elements 0.90639
published_at 2026-04-12T12:55:00Z
7
value 0.0594
scoring_system epss
scoring_elements 0.90634
published_at 2026-04-13T12:55:00Z
8
value 0.0594
scoring_system epss
scoring_elements 0.90653
published_at 2026-04-16T12:55:00Z
9
value 0.0594
scoring_system epss
scoring_elements 0.9065
published_at 2026-04-18T12:55:00Z
10
value 0.0594
scoring_system epss
scoring_elements 0.90648
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-10858
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10858
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10919
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1612805
reference_id 1612805
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1612805
6
reference_url https://security.gentoo.org/glsa/202003-52
reference_id GLSA-202003-52
reference_type
scores
url https://security.gentoo.org/glsa/202003-52
7
reference_url https://access.redhat.com/errata/RHSA-2018:2612
reference_id RHSA-2018:2612
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2612
8
reference_url https://access.redhat.com/errata/RHSA-2018:2613
reference_id RHSA-2018:2613
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2613
9
reference_url https://access.redhat.com/errata/RHSA-2018:3056
reference_id RHSA-2018:3056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3056
10
reference_url https://access.redhat.com/errata/RHSA-2018:3470
reference_id RHSA-2018:3470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3470
11
reference_url https://usn.ubuntu.com/3738-1/
reference_id USN-3738-1
reference_type
scores
url https://usn.ubuntu.com/3738-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.8.4%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.8.4%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.8.4%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2018-10858
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mbcb-7zmf-2yah
120
url VCID-mcvk-8b6w-6kc2
vulnerability_id VCID-mcvk-8b6w-6kc2
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0086.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0086.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2003-0086
reference_id
reference_type
scores
0
value 0.00325
scoring_system epss
scoring_elements 0.55362
published_at 2026-04-01T12:55:00Z
1
value 0.00325
scoring_system epss
scoring_elements 0.55473
published_at 2026-04-02T12:55:00Z
2
value 0.00325
scoring_system epss
scoring_elements 0.55498
published_at 2026-04-04T12:55:00Z
3
value 0.00325
scoring_system epss
scoring_elements 0.55476
published_at 2026-04-07T12:55:00Z
4
value 0.00325
scoring_system epss
scoring_elements 0.55527
published_at 2026-04-08T12:55:00Z
5
value 0.00325
scoring_system epss
scoring_elements 0.55528
published_at 2026-04-09T12:55:00Z
6
value 0.00325
scoring_system epss
scoring_elements 0.55537
published_at 2026-04-11T12:55:00Z
7
value 0.00325
scoring_system epss
scoring_elements 0.55516
published_at 2026-04-12T12:55:00Z
8
value 0.00325
scoring_system epss
scoring_elements 0.555
published_at 2026-04-13T12:55:00Z
9
value 0.00325
scoring_system epss
scoring_elements 0.55536
published_at 2026-04-16T12:55:00Z
10
value 0.00325
scoring_system epss
scoring_elements 0.5554
published_at 2026-04-18T12:55:00Z
11
value 0.00325
scoring_system epss
scoring_elements 0.55518
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2003-0086
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0086
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0086
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1616964
reference_id 1616964
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1616964
4
reference_url https://access.redhat.com/errata/RHSA-2003:095
reference_id RHSA-2003:095
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:095
5
reference_url https://access.redhat.com/errata/RHSA-2003:096
reference_id RHSA-2003:096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:096
6
reference_url https://access.redhat.com/errata/RHSA-2003:226
reference_id RHSA-2003:226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:226
fixed_packages
0
url pkg:deb/debian/samba@2.2.8?distro=trixie
purl pkg:deb/debian/samba@2.2.8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2.2.8%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2003-0086
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mcvk-8b6w-6kc2
121
url VCID-mgaq-qjdw-fke4
vulnerability_id VCID-mgaq-qjdw-fke4
summary samba: AD DC check password script does not receive full password when non-ASCII characters are used
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14833.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14833.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-14833
reference_id
reference_type
scores
0
value 0.01267
scoring_system epss
scoring_elements 0.79414
published_at 2026-04-01T12:55:00Z
1
value 0.01267
scoring_system epss
scoring_elements 0.79496
published_at 2026-04-21T12:55:00Z
2
value 0.01267
scoring_system epss
scoring_elements 0.79469
published_at 2026-04-09T12:55:00Z
3
value 0.01267
scoring_system epss
scoring_elements 0.79491
published_at 2026-04-18T12:55:00Z
4
value 0.01267
scoring_system epss
scoring_elements 0.79473
published_at 2026-04-12T12:55:00Z
5
value 0.01267
scoring_system epss
scoring_elements 0.79463
published_at 2026-04-13T12:55:00Z
6
value 0.01267
scoring_system epss
scoring_elements 0.79494
published_at 2026-04-16T12:55:00Z
7
value 0.01267
scoring_system epss
scoring_elements 0.79421
published_at 2026-04-02T12:55:00Z
8
value 0.01267
scoring_system epss
scoring_elements 0.79444
published_at 2026-04-04T12:55:00Z
9
value 0.01267
scoring_system epss
scoring_elements 0.7943
published_at 2026-04-07T12:55:00Z
10
value 0.01267
scoring_system epss
scoring_elements 0.79459
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-14833
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14833
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14833
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14833
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html
7
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKPYHDFI7HRELVXBE5J4MTGSI35AKFBI/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKPYHDFI7HRELVXBE5J4MTGSI35AKFBI/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UMIYCYXCPRTVCVZ3TP6ZGPJ6RZS3IX4G/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UMIYCYXCPRTVCVZ3TP6ZGPJ6RZS3IX4G/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3IUACPZJXSC4OM6P2V4IC4QMZQZWPD/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3IUACPZJXSC4OM6P2V4IC4QMZQZWPD/
11
reference_url https://www.samba.org/samba/security/CVE-2019-14833.html
reference_id
reference_type
scores
url https://www.samba.org/samba/security/CVE-2019-14833.html
12
reference_url https://www.synology.com/security/advisory/Synology_SA_19_35
reference_id
reference_type
scores
url https://www.synology.com/security/advisory/Synology_SA_19_35
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1764126
reference_id 1764126
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1764126
14
reference_url https://security.archlinux.org/ASA-201911-6
reference_id ASA-201911-6
reference_type
scores
url https://security.archlinux.org/ASA-201911-6
15
reference_url https://security.archlinux.org/AVG-1057
reference_id AVG-1057
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1057
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-14833
reference_id CVE-2019-14833
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:P/A:N
1
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
2
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-14833
22
reference_url https://usn.ubuntu.com/4167-1/
reference_id USN-4167-1
reference_type
scores
url https://usn.ubuntu.com/4167-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.11.1%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.11.1%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.11.1%252Bdfsg-2%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2019-14833
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mgaq-qjdw-fke4
122
url VCID-mkwq-6u7n-77dp
vulnerability_id VCID-mkwq-6u7n-77dp
summary samba: cross-site request forgery vulnerability in SWAT
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00019.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00019.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00042.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00042.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2013-02/msg00029.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-02/msg00029.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2013-02/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-02/msg00033.html
4
reference_url http://osvdb.org/89627
reference_id
reference_type
scores
url http://osvdb.org/89627
5
reference_url http://rhn.redhat.com/errata/RHSA-2013-1310.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1310.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2013-1542.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1542.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2014-0305.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-0305.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0214.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0214.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-0214
reference_id
reference_type
scores
0
value 0.04872
scoring_system epss
scoring_elements 0.89571
published_at 2026-04-21T12:55:00Z
1
value 0.04872
scoring_system epss
scoring_elements 0.89521
published_at 2026-04-01T12:55:00Z
2
value 0.04872
scoring_system epss
scoring_elements 0.89524
published_at 2026-04-02T12:55:00Z
3
value 0.04872
scoring_system epss
scoring_elements 0.89537
published_at 2026-04-04T12:55:00Z
4
value 0.04872
scoring_system epss
scoring_elements 0.89538
published_at 2026-04-07T12:55:00Z
5
value 0.04872
scoring_system epss
scoring_elements 0.89554
published_at 2026-04-08T12:55:00Z
6
value 0.04872
scoring_system epss
scoring_elements 0.89559
published_at 2026-04-13T12:55:00Z
7
value 0.04872
scoring_system epss
scoring_elements 0.89566
published_at 2026-04-11T12:55:00Z
8
value 0.04872
scoring_system epss
scoring_elements 0.89565
published_at 2026-04-12T12:55:00Z
9
value 0.04872
scoring_system epss
scoring_elements 0.89573
published_at 2026-04-16T12:55:00Z
10
value 0.04872
scoring_system epss
scoring_elements 0.89575
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-0214
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0214
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0214
11
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993
12
reference_url http://www.debian.org/security/2013/dsa-2617
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2617
13
reference_url http://www.samba.org/samba/security/CVE-2013-0214
reference_id
reference_type
scores
url http://www.samba.org/samba/security/CVE-2013-0214
14
reference_url http://www.securityfocus.com/bid/57631
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/57631
15
reference_url http://www.ubuntu.com/usn/USN-2922-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2922-1
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=905704
reference_id 905704
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=905704
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.1.0:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.15:*:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.16:*:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.12:*:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.13:*:*:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.14:*:*:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.15:*:*:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.16:*:*:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.17:*:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*
138
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*
139
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*
140
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*
141
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*
142
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*
143
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*
144
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*
145
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*
146
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*
147
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*
148
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*
149
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*
150
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*
151
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.14:*:*:*:*:*:*:*
152
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.15:*:*:*:*:*:*:*
153
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.16:*:*:*:*:*:*:*
154
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.17:*:*:*:*:*:*:*
155
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.18:*:*:*:*:*:*:*
156
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.19:*:*:*:*:*:*:*
157
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*
158
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.20:*:*:*:*:*:*:*
159
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*
160
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*
161
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*
162
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*
163
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*
164
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*
165
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*
166
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*
167
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*
168
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*
169
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*
170
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*
171
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*
172
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*
173
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*
174
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*
175
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*
176
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*
177
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*
178
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
179
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*
180
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-0214
reference_id CVE-2013-0214
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-0214
181
reference_url https://access.redhat.com/errata/RHSA-2013:1310
reference_id RHSA-2013:1310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1310
182
reference_url https://access.redhat.com/errata/RHSA-2013:1542
reference_id RHSA-2013:1542
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1542
183
reference_url https://access.redhat.com/errata/RHSA-2014:0305
reference_id RHSA-2014:0305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0305
184
reference_url https://usn.ubuntu.com/2922-1/
reference_id USN-2922-1
reference_type
scores
url https://usn.ubuntu.com/2922-1/
fixed_packages
0
url pkg:deb/debian/samba@2:3.6.6-5?distro=trixie
purl pkg:deb/debian/samba@2:3.6.6-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:3.6.6-5%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2013-0214
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mkwq-6u7n-77dp
123
url VCID-mq2v-5khm-yucb
vulnerability_id VCID-mq2v-5khm-yucb
summary Samba mtab lock file race condition
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3585.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3585.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3585
reference_id
reference_type
scores
0
value 0.0055
scoring_system epss
scoring_elements 0.67888
published_at 2026-04-01T12:55:00Z
1
value 0.0055
scoring_system epss
scoring_elements 0.67911
published_at 2026-04-02T12:55:00Z
2
value 0.0055
scoring_system epss
scoring_elements 0.6793
published_at 2026-04-04T12:55:00Z
3
value 0.0055
scoring_system epss
scoring_elements 0.67909
published_at 2026-04-07T12:55:00Z
4
value 0.0055
scoring_system epss
scoring_elements 0.6796
published_at 2026-04-08T12:55:00Z
5
value 0.0055
scoring_system epss
scoring_elements 0.67974
published_at 2026-04-09T12:55:00Z
6
value 0.0055
scoring_system epss
scoring_elements 0.67997
published_at 2026-04-11T12:55:00Z
7
value 0.0055
scoring_system epss
scoring_elements 0.67984
published_at 2026-04-12T12:55:00Z
8
value 0.0055
scoring_system epss
scoring_elements 0.67949
published_at 2026-04-13T12:55:00Z
9
value 0.0055
scoring_system epss
scoring_elements 0.67986
published_at 2026-04-16T12:55:00Z
10
value 0.0055
scoring_system epss
scoring_elements 0.67999
published_at 2026-04-18T12:55:00Z
11
value 0.0055
scoring_system epss
scoring_elements 0.67981
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3585
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3585
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=742907
reference_id 742907
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=742907
4
reference_url https://access.redhat.com/errata/RHSA-2011:1219
reference_id RHSA-2011:1219
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1219
5
reference_url https://access.redhat.com/errata/RHSA-2011:1221
reference_id RHSA-2011:1221
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1221
6
reference_url https://usn.ubuntu.com/1226-1/
reference_id USN-1226-1
reference_type
scores
url https://usn.ubuntu.com/1226-1/
fixed_packages
0
url pkg:deb/debian/samba@2:3.4.7~dfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:3.4.7~dfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:3.4.7~dfsg-2%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2011-3585
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mq2v-5khm-yucb
124
url VCID-mqma-hvyk-kkhh
vulnerability_id VCID-mqma-hvyk-kkhh
summary
Samba contains multiple vulnerabilities potentially resulting in the
    execution of arbitrary code with root privileges.
references
0
reference_url http://docs.info.apple.com/article.html?artnum=306172
reference_id
reference_type
scores
url http://docs.info.apple.com/article.html?artnum=306172
1
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01067768
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01067768
2
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01078980
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01078980
3
reference_url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=534
reference_id
reference_type
scores
url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=534
4
reference_url http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html
5
reference_url http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html
reference_id
reference_type
scores
url http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html
6
reference_url http://lists.suse.com/archive/suse-security-announce/2007-May/0006.html
reference_id
reference_type
scores
url http://lists.suse.com/archive/suse-security-announce/2007-May/0006.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2447.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2447.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-2447
reference_id
reference_type
scores
0
value 0.77376
scoring_system epss
scoring_elements 0.98985
published_at 2026-04-21T12:55:00Z
1
value 0.77376
scoring_system epss
scoring_elements 0.98982
published_at 2026-04-12T12:55:00Z
2
value 0.77376
scoring_system epss
scoring_elements 0.98983
published_at 2026-04-13T12:55:00Z
3
value 0.77376
scoring_system epss
scoring_elements 0.98984
published_at 2026-04-16T12:55:00Z
4
value 0.78237
scoring_system epss
scoring_elements 0.99012
published_at 2026-04-01T12:55:00Z
5
value 0.78237
scoring_system epss
scoring_elements 0.9902
published_at 2026-04-09T12:55:00Z
6
value 0.78237
scoring_system epss
scoring_elements 0.99014
published_at 2026-04-02T12:55:00Z
7
value 0.78237
scoring_system epss
scoring_elements 0.99016
published_at 2026-04-04T12:55:00Z
8
value 0.78237
scoring_system epss
scoring_elements 0.99018
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-2447
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2447
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2447
10
reference_url http://secunia.com/advisories/25232
reference_id
reference_type
scores
url http://secunia.com/advisories/25232
11
reference_url http://secunia.com/advisories/25241
reference_id
reference_type
scores
url http://secunia.com/advisories/25241
12
reference_url http://secunia.com/advisories/25246
reference_id
reference_type
scores
url http://secunia.com/advisories/25246
13
reference_url http://secunia.com/advisories/25251
reference_id
reference_type
scores
url http://secunia.com/advisories/25251
14
reference_url http://secunia.com/advisories/25255
reference_id
reference_type
scores
url http://secunia.com/advisories/25255
15
reference_url http://secunia.com/advisories/25256
reference_id
reference_type
scores
url http://secunia.com/advisories/25256
16
reference_url http://secunia.com/advisories/25257
reference_id
reference_type
scores
url http://secunia.com/advisories/25257
17
reference_url http://secunia.com/advisories/25259
reference_id
reference_type
scores
url http://secunia.com/advisories/25259
18
reference_url http://secunia.com/advisories/25270
reference_id
reference_type
scores
url http://secunia.com/advisories/25270
19
reference_url http://secunia.com/advisories/25289
reference_id
reference_type
scores
url http://secunia.com/advisories/25289
20
reference_url http://secunia.com/advisories/25567
reference_id
reference_type
scores
url http://secunia.com/advisories/25567
21
reference_url http://secunia.com/advisories/25675
reference_id
reference_type
scores
url http://secunia.com/advisories/25675
22
reference_url http://secunia.com/advisories/25772
reference_id
reference_type
scores
url http://secunia.com/advisories/25772
23
reference_url http://secunia.com/advisories/26083
reference_id
reference_type
scores
url http://secunia.com/advisories/26083
24
reference_url http://secunia.com/advisories/26235
reference_id
reference_type
scores
url http://secunia.com/advisories/26235
25
reference_url http://secunia.com/advisories/26909
reference_id
reference_type
scores
url http://secunia.com/advisories/26909
26
reference_url http://secunia.com/advisories/27706
reference_id
reference_type
scores
url http://secunia.com/advisories/27706
27
reference_url http://secunia.com/advisories/28292
reference_id
reference_type
scores
url http://secunia.com/advisories/28292
28
reference_url http://security.gentoo.org/glsa/glsa-200705-15.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200705-15.xml
29
reference_url http://securityreason.com/securityalert/2700
reference_id
reference_type
scores
url http://securityreason.com/securityalert/2700
30
reference_url https://issues.rpath.com/browse/RPL-1366
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1366
31
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.475906
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.475906
32
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10062
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10062
33
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102964-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102964-1
34
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-66-200588-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-66-200588-1
35
reference_url http://www.debian.org/security/2007/dsa-1291
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1291
36
reference_url http://www.kb.cert.org/vuls/id/268336
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/268336
37
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:104
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:104
38
reference_url http://www.novell.com/linux/security/advisories/2007_14_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_14_sr.html
39
reference_url http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html
reference_id
reference_type
scores
url http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html
40
reference_url http://www.openwall.com/lists/oss-security/2025/10/16/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2025/10/16/2
41
reference_url http://www.osvdb.org/34700
reference_id
reference_type
scores
url http://www.osvdb.org/34700
42
reference_url http://www.redhat.com/support/errata/RHSA-2007-0354.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0354.html
43
reference_url http://www.samba.org/samba/security/CVE-2007-2447.html
reference_id
reference_type
scores
url http://www.samba.org/samba/security/CVE-2007-2447.html
44
reference_url http://www.securityfocus.com/archive/1/468565/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/468565/100/0/threaded
45
reference_url http://www.securityfocus.com/archive/1/468670/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/468670/100/0/threaded
46
reference_url http://www.securityfocus.com/bid/23972
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/23972
47
reference_url http://www.securityfocus.com/bid/25159
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/25159
48
reference_url http://www.securitytracker.com/id?1018051
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1018051
49
reference_url http://www.trustix.org/errata/2007/0017/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0017/
50
reference_url http://www.ubuntu.com/usn/usn-460-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-460-1
51
reference_url http://www.vupen.com/english/advisories/2007/1805
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1805
52
reference_url http://www.vupen.com/english/advisories/2007/2079
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2079
53
reference_url http://www.vupen.com/english/advisories/2007/2210
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2210
54
reference_url http://www.vupen.com/english/advisories/2007/2281
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2281
55
reference_url http://www.vupen.com/english/advisories/2007/2732
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2732
56
reference_url http://www.vupen.com/english/advisories/2007/3229
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/3229
57
reference_url http://www.vupen.com/english/advisories/2008/0050
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/0050
58
reference_url http://www.xerox.com/downloads/usa/en/c/cert_XRX08_001.pdf
reference_id
reference_type
scores
url http://www.xerox.com/downloads/usa/en/c/cert_XRX08_001.pdf
59
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=239774
reference_id 239774
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=239774
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-2447
reference_id CVE-2007-2447
reference_type
scores
0
value 6.0
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-2447
103
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/remote/16320.rb
reference_id CVE-2007-2447;OSVDB-34700
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/remote/16320.rb
104
reference_url https://security.gentoo.org/glsa/200705-15
reference_id GLSA-200705-15
reference_type
scores
url https://security.gentoo.org/glsa/200705-15
105
reference_url https://access.redhat.com/errata/RHSA-2007:0354
reference_id RHSA-2007:0354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0354
106
reference_url https://usn.ubuntu.com/460-1/
reference_id USN-460-1
reference_type
scores
url https://usn.ubuntu.com/460-1/
fixed_packages
0
url pkg:deb/debian/samba@3.0.25-1?distro=trixie
purl pkg:deb/debian/samba@3.0.25-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@3.0.25-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2007-2447
risk_score 10.0
exploitability 2.0
weighted_severity 5.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mqma-hvyk-kkhh
125
url VCID-ms8n-kvmc-5bh4
vulnerability_id VCID-ms8n-kvmc-5bh4
summary
Multiple flaws exist in the Samba suite of programs, the most serious of
    which could result in the execution of arbitrary code.
references
0
reference_url http://osvdb.org/33101
reference_id
reference_type
scores
url http://osvdb.org/33101
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0454.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0454.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-0454
reference_id
reference_type
scores
0
value 0.04407
scoring_system epss
scoring_elements 0.89026
published_at 2026-04-18T12:55:00Z
1
value 0.04407
scoring_system epss
scoring_elements 0.88959
published_at 2026-04-01T12:55:00Z
2
value 0.04407
scoring_system epss
scoring_elements 0.88967
published_at 2026-04-02T12:55:00Z
3
value 0.04407
scoring_system epss
scoring_elements 0.88983
published_at 2026-04-04T12:55:00Z
4
value 0.04407
scoring_system epss
scoring_elements 0.88986
published_at 2026-04-07T12:55:00Z
5
value 0.04407
scoring_system epss
scoring_elements 0.89004
published_at 2026-04-08T12:55:00Z
6
value 0.04407
scoring_system epss
scoring_elements 0.89009
published_at 2026-04-09T12:55:00Z
7
value 0.04407
scoring_system epss
scoring_elements 0.89021
published_at 2026-04-21T12:55:00Z
8
value 0.04407
scoring_system epss
scoring_elements 0.89016
published_at 2026-04-12T12:55:00Z
9
value 0.04407
scoring_system epss
scoring_elements 0.89014
published_at 2026-04-13T12:55:00Z
10
value 0.04407
scoring_system epss
scoring_elements 0.89028
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-0454
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0454
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0454
4
reference_url http://secunia.com/advisories/24021
reference_id
reference_type
scores
url http://secunia.com/advisories/24021
5
reference_url http://secunia.com/advisories/24046
reference_id
reference_type
scores
url http://secunia.com/advisories/24046
6
reference_url http://secunia.com/advisories/24060
reference_id
reference_type
scores
url http://secunia.com/advisories/24060
7
reference_url http://secunia.com/advisories/24067
reference_id
reference_type
scores
url http://secunia.com/advisories/24067
8
reference_url http://secunia.com/advisories/24101
reference_id
reference_type
scores
url http://secunia.com/advisories/24101
9
reference_url http://secunia.com/advisories/24145
reference_id
reference_type
scores
url http://secunia.com/advisories/24145
10
reference_url http://secunia.com/advisories/24151
reference_id
reference_type
scores
url http://secunia.com/advisories/24151
11
reference_url http://securitytracker.com/id?1017588
reference_id
reference_type
scores
url http://securitytracker.com/id?1017588
12
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/32304
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/32304
13
reference_url https://issues.rpath.com/browse/RPL-1005
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1005
14
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.476916
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.476916
15
reference_url http://us1.samba.org/samba/security/CVE-2007-0454.html
reference_id
reference_type
scores
url http://us1.samba.org/samba/security/CVE-2007-0454.html
16
reference_url http://www.debian.org/security/2007/dsa-1257
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1257
17
reference_url http://www.gentoo.org/security/en/glsa/glsa-200702-01.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200702-01.xml
18
reference_url http://www.kb.cert.org/vuls/id/649732
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/649732
19
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:034
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:034
20
reference_url http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html
reference_id
reference_type
scores
url http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html
21
reference_url http://www.securityfocus.com/archive/1/459179/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/459179/100/0/threaded
22
reference_url http://www.securityfocus.com/archive/1/459365/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/459365/100/0/threaded
23
reference_url http://www.securityfocus.com/bid/22403
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/22403
24
reference_url http://www.trustix.org/errata/2007/0007
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0007
25
reference_url http://www.ubuntu.com/usn/usn-419-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-419-1
26
reference_url http://www.vupen.com/english/advisories/2007/0483
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/0483
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86_64:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linuxsoft_2007:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linuxsoft_2007:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linuxsoft_2007:*:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linuxsoft_2007:*:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linuxsoft_2007:*:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linuxsoft_2007:*:*:x86_64:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-0454
reference_id CVE-2007-0454
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-0454
80
reference_url https://security.gentoo.org/glsa/200702-01
reference_id GLSA-200702-01
reference_type
scores
url https://security.gentoo.org/glsa/200702-01
81
reference_url https://usn.ubuntu.com/419-1/
reference_id USN-419-1
reference_type
scores
url https://usn.ubuntu.com/419-1/
fixed_packages
0
url pkg:deb/debian/samba@3.0.23d-5?distro=trixie
purl pkg:deb/debian/samba@3.0.23d-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@3.0.23d-5%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2007-0454
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ms8n-kvmc-5bh4
126
url VCID-mw6j-fkm4-pkg2
vulnerability_id VCID-mw6j-fkm4-pkg2
summary Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25721.json
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25721.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-25721
reference_id
reference_type
scores
0
value 0.00367
scoring_system epss
scoring_elements 0.58562
published_at 2026-04-01T12:55:00Z
1
value 0.00367
scoring_system epss
scoring_elements 0.58707
published_at 2026-04-18T12:55:00Z
2
value 0.00367
scoring_system epss
scoring_elements 0.5867
published_at 2026-04-13T12:55:00Z
3
value 0.00367
scoring_system epss
scoring_elements 0.58703
published_at 2026-04-16T12:55:00Z
4
value 0.00367
scoring_system epss
scoring_elements 0.58646
published_at 2026-04-02T12:55:00Z
5
value 0.00367
scoring_system epss
scoring_elements 0.58667
published_at 2026-04-04T12:55:00Z
6
value 0.00367
scoring_system epss
scoring_elements 0.58633
published_at 2026-04-07T12:55:00Z
7
value 0.00367
scoring_system epss
scoring_elements 0.58685
published_at 2026-04-21T12:55:00Z
8
value 0.00367
scoring_system epss
scoring_elements 0.58691
published_at 2026-04-09T12:55:00Z
9
value 0.00367
scoring_system epss
scoring_elements 0.58709
published_at 2026-04-11T12:55:00Z
10
value 0.00367
scoring_system epss
scoring_elements 0.5869
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-25721
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2021728
reference_id 2021728
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2021728
12
reference_url https://security.archlinux.org/AVG-2538
reference_id AVG-2538
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2538
13
reference_url https://security.gentoo.org/glsa/202309-06
reference_id GLSA-202309-06
reference_type
scores
url https://security.gentoo.org/glsa/202309-06
14
reference_url https://usn.ubuntu.com/5142-1/
reference_id USN-5142-1
reference_type
scores
url https://usn.ubuntu.com/5142-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u2?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u2%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.13.14%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.13.14%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.14%252Bdfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
6
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2020-25721
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mw6j-fkm4-pkg2
127
url VCID-na1p-rafw-g3dq
vulnerability_id VCID-na1p-rafw-g3dq
summary samba: insecure "wide links" default
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0926.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0926.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0926
reference_id
reference_type
scores
0
value 0.29358
scoring_system epss
scoring_elements 0.96566
published_at 2026-04-01T12:55:00Z
1
value 0.29358
scoring_system epss
scoring_elements 0.96575
published_at 2026-04-02T12:55:00Z
2
value 0.29358
scoring_system epss
scoring_elements 0.9658
published_at 2026-04-04T12:55:00Z
3
value 0.29358
scoring_system epss
scoring_elements 0.96583
published_at 2026-04-07T12:55:00Z
4
value 0.29358
scoring_system epss
scoring_elements 0.96591
published_at 2026-04-08T12:55:00Z
5
value 0.29358
scoring_system epss
scoring_elements 0.96593
published_at 2026-04-09T12:55:00Z
6
value 0.29358
scoring_system epss
scoring_elements 0.96595
published_at 2026-04-11T12:55:00Z
7
value 0.52408
scoring_system epss
scoring_elements 0.97931
published_at 2026-04-12T12:55:00Z
8
value 0.52408
scoring_system epss
scoring_elements 0.97932
published_at 2026-04-13T12:55:00Z
9
value 0.52408
scoring_system epss
scoring_elements 0.97938
published_at 2026-04-21T12:55:00Z
10
value 0.52408
scoring_system epss
scoring_elements 0.9794
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0926
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0926
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=562568
reference_id 562568
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=562568
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=568493
reference_id 568493
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=568493
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/33598.rb
reference_id CVE-2010-0926;OSVDB-62145
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/33598.rb
6
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/33599.txt
reference_id CVE-2010-0926;OSVDB-62145
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/33599.txt
7
reference_url https://www.securityfocus.com/bid/38111/info
reference_id CVE-2010-0926;OSVDB-62145
reference_type exploit
scores
url https://www.securityfocus.com/bid/38111/info
8
reference_url https://access.redhat.com/errata/RHSA-2012:0313
reference_id RHSA-2012:0313
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0313
9
reference_url https://usn.ubuntu.com/918-1/
reference_id USN-918-1
reference_type
scores
url https://usn.ubuntu.com/918-1/
fixed_packages
0
url pkg:deb/debian/samba@2:3.4.6~dfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:3.4.6~dfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:3.4.6~dfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2010-0926
risk_score 1.0
exploitability 2.0
weighted_severity 0.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-na1p-rafw-g3dq
128
url VCID-nczv-t6z5-jfhu
vulnerability_id VCID-nczv-t6z5-jfhu
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which may allow execution of arbitrary code with root privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0728.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0728.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0728
reference_id
reference_type
scores
0
value 0.01934
scoring_system epss
scoring_elements 0.83333
published_at 2026-04-01T12:55:00Z
1
value 0.01934
scoring_system epss
scoring_elements 0.83347
published_at 2026-04-02T12:55:00Z
2
value 0.01934
scoring_system epss
scoring_elements 0.83362
published_at 2026-04-04T12:55:00Z
3
value 0.01934
scoring_system epss
scoring_elements 0.83361
published_at 2026-04-07T12:55:00Z
4
value 0.01934
scoring_system epss
scoring_elements 0.83385
published_at 2026-04-08T12:55:00Z
5
value 0.01934
scoring_system epss
scoring_elements 0.83394
published_at 2026-04-09T12:55:00Z
6
value 0.01934
scoring_system epss
scoring_elements 0.8341
published_at 2026-04-11T12:55:00Z
7
value 0.01934
scoring_system epss
scoring_elements 0.83404
published_at 2026-04-12T12:55:00Z
8
value 0.01934
scoring_system epss
scoring_elements 0.834
published_at 2026-04-13T12:55:00Z
9
value 0.01934
scoring_system epss
scoring_elements 0.83435
published_at 2026-04-16T12:55:00Z
10
value 0.01934
scoring_system epss
scoring_elements 0.83437
published_at 2026-04-18T12:55:00Z
11
value 0.01934
scoring_system epss
scoring_elements 0.83436
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0728
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0728
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=573223
reference_id 573223
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=573223
4
reference_url https://security.gentoo.org/glsa/201206-22
reference_id GLSA-201206-22
reference_type
scores
url https://security.gentoo.org/glsa/201206-22
fixed_packages
0
url pkg:deb/debian/samba@2:3.4.7~dfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:3.4.7~dfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:3.4.7~dfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2010-0728
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nczv-t6z5-jfhu
129
url VCID-nktk-t8av-jbb2
vulnerability_id VCID-nktk-t8av-jbb2
summary samba format string vulnerabilities
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1886.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1886.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1886
reference_id
reference_type
scores
0
value 0.24809
scoring_system epss
scoring_elements 0.96114
published_at 2026-04-01T12:55:00Z
1
value 0.24809
scoring_system epss
scoring_elements 0.96122
published_at 2026-04-02T12:55:00Z
2
value 0.24809
scoring_system epss
scoring_elements 0.96128
published_at 2026-04-04T12:55:00Z
3
value 0.24809
scoring_system epss
scoring_elements 0.96133
published_at 2026-04-07T12:55:00Z
4
value 0.24809
scoring_system epss
scoring_elements 0.96144
published_at 2026-04-08T12:55:00Z
5
value 0.24809
scoring_system epss
scoring_elements 0.96148
published_at 2026-04-09T12:55:00Z
6
value 0.24809
scoring_system epss
scoring_elements 0.9615
published_at 2026-04-12T12:55:00Z
7
value 0.24809
scoring_system epss
scoring_elements 0.96151
published_at 2026-04-13T12:55:00Z
8
value 0.24809
scoring_system epss
scoring_elements 0.9616
published_at 2026-04-16T12:55:00Z
9
value 0.24809
scoring_system epss
scoring_elements 0.96164
published_at 2026-04-18T12:55:00Z
10
value 0.24809
scoring_system epss
scoring_elements 0.96165
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1886
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1886
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=508061
reference_id 508061
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=508061
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/33053.txt
reference_id CVE-2009-1886;OSVDB-55412
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/33053.txt
5
reference_url https://www.securityfocus.com/bid/35472/info
reference_id CVE-2009-1886;OSVDB-55412
reference_type exploit
scores
url https://www.securityfocus.com/bid/35472/info
6
reference_url https://usn.ubuntu.com/839-1/
reference_id USN-839-1
reference_type
scores
url https://usn.ubuntu.com/839-1/
fixed_packages
0
url pkg:deb/debian/samba@2:3.3.6-1?distro=trixie
purl pkg:deb/debian/samba@2:3.3.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:3.3.6-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2009-1886
risk_score 0.4
exploitability 2.0
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nktk-t8av-jbb2
130
url VCID-nted-1p4h-y7fz
vulnerability_id VCID-nted-1p4h-y7fz
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1050.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1050.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1050
reference_id
reference_type
scores
0
value 0.22357
scoring_system epss
scoring_elements 0.95782
published_at 2026-04-01T12:55:00Z
1
value 0.22357
scoring_system epss
scoring_elements 0.95839
published_at 2026-04-21T12:55:00Z
2
value 0.22357
scoring_system epss
scoring_elements 0.95831
published_at 2026-04-16T12:55:00Z
3
value 0.22357
scoring_system epss
scoring_elements 0.95836
published_at 2026-04-18T12:55:00Z
4
value 0.22357
scoring_system epss
scoring_elements 0.95792
published_at 2026-04-02T12:55:00Z
5
value 0.22357
scoring_system epss
scoring_elements 0.958
published_at 2026-04-04T12:55:00Z
6
value 0.22357
scoring_system epss
scoring_elements 0.95803
published_at 2026-04-07T12:55:00Z
7
value 0.22357
scoring_system epss
scoring_elements 0.95811
published_at 2026-04-08T12:55:00Z
8
value 0.22357
scoring_system epss
scoring_elements 0.95814
published_at 2026-04-09T12:55:00Z
9
value 0.22357
scoring_system epss
scoring_elements 0.95818
published_at 2026-04-12T12:55:00Z
10
value 0.22357
scoring_system epss
scoring_elements 0.9582
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1050
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1050
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1050
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1057
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1057
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1538771
reference_id 1538771
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1538771
6
reference_url https://security.archlinux.org/ASA-201803-10
reference_id ASA-201803-10
reference_type
scores
url https://security.archlinux.org/ASA-201803-10
7
reference_url https://security.archlinux.org/AVG-651
reference_id AVG-651
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-651
8
reference_url https://security.gentoo.org/glsa/201805-07
reference_id GLSA-201805-07
reference_type
scores
url https://security.gentoo.org/glsa/201805-07
9
reference_url https://access.redhat.com/errata/RHSA-2018:1860
reference_id RHSA-2018:1860
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1860
10
reference_url https://access.redhat.com/errata/RHSA-2018:1883
reference_id RHSA-2018:1883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1883
11
reference_url https://access.redhat.com/errata/RHSA-2018:2612
reference_id RHSA-2018:2612
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2612
12
reference_url https://access.redhat.com/errata/RHSA-2018:2613
reference_id RHSA-2018:2613
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2613
13
reference_url https://access.redhat.com/errata/RHSA-2018:3056
reference_id RHSA-2018:3056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3056
14
reference_url https://usn.ubuntu.com/3595-1/
reference_id USN-3595-1
reference_type
scores
url https://usn.ubuntu.com/3595-1/
15
reference_url https://usn.ubuntu.com/3595-2/
reference_id USN-3595-2
reference_type
scores
url https://usn.ubuntu.com/3595-2/
fixed_packages
0
url pkg:deb/debian/samba@2:4.7.4%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.7.4%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.7.4%252Bdfsg-2%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2018-1050
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nted-1p4h-y7fz
131
url VCID-p1se-92ae-t3b5
vulnerability_id VCID-p1se-92ae-t3b5
summary Multiple vulnerabilities have been discovered in Samba, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2127.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2127.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2127
reference_id
reference_type
scores
0
value 0.0115
scoring_system epss
scoring_elements 0.78507
published_at 2026-04-21T12:55:00Z
1
value 0.01247
scoring_system epss
scoring_elements 0.79265
published_at 2026-04-02T12:55:00Z
2
value 0.01247
scoring_system epss
scoring_elements 0.79309
published_at 2026-04-09T12:55:00Z
3
value 0.01247
scoring_system epss
scoring_elements 0.79333
published_at 2026-04-16T12:55:00Z
4
value 0.01247
scoring_system epss
scoring_elements 0.79317
published_at 2026-04-12T12:55:00Z
5
value 0.01247
scoring_system epss
scoring_elements 0.79306
published_at 2026-04-13T12:55:00Z
6
value 0.01247
scoring_system epss
scoring_elements 0.79329
published_at 2026-04-18T12:55:00Z
7
value 0.01247
scoring_system epss
scoring_elements 0.79288
published_at 2026-04-04T12:55:00Z
8
value 0.01247
scoring_system epss
scoring_elements 0.79274
published_at 2026-04-07T12:55:00Z
9
value 0.01247
scoring_system epss
scoring_elements 0.793
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2127
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2222791
reference_id 2222791
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T15:21:45Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2222791
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::resilientstorage
reference_id cpe:/a:redhat:enterprise_linux:9::resilientstorage
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::resilientstorage
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb
reference_id cpe:/a:redhat:rhel_eus:8.6::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb
reference_id cpe:/a:redhat:rhel_eus:8.8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:storage:3
reference_id cpe:/a:redhat:storage:3
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:storage:3
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos
reference_id cpe:/o:redhat:rhel_eus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8
reference_id cpe:/o:redhat:rhev_hypervisor:4.4::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8
27
reference_url https://access.redhat.com/security/cve/CVE-2022-2127
reference_id CVE-2022-2127
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T15:21:45Z/
url https://access.redhat.com/security/cve/CVE-2022-2127
28
reference_url https://www.samba.org/samba/security/CVE-2022-2127.html
reference_id CVE-2022-2127.html
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T15:21:45Z/
url https://www.samba.org/samba/security/CVE-2022-2127.html
29
reference_url https://security.gentoo.org/glsa/202402-28
reference_id GLSA-202402-28
reference_type
scores
url https://security.gentoo.org/glsa/202402-28
30
reference_url https://access.redhat.com/errata/RHSA-2023:6667
reference_id RHSA-2023:6667
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T15:21:45Z/
url https://access.redhat.com/errata/RHSA-2023:6667
31
reference_url https://access.redhat.com/errata/RHSA-2023:7139
reference_id RHSA-2023:7139
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T15:21:45Z/
url https://access.redhat.com/errata/RHSA-2023:7139
32
reference_url https://access.redhat.com/errata/RHSA-2024:0423
reference_id RHSA-2024:0423
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T15:21:45Z/
url https://access.redhat.com/errata/RHSA-2024:0423
33
reference_url https://access.redhat.com/errata/RHSA-2024:0580
reference_id RHSA-2024:0580
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T15:21:45Z/
url https://access.redhat.com/errata/RHSA-2024:0580
34
reference_url https://usn.ubuntu.com/6238-1/
reference_id USN-6238-1
reference_type
scores
url https://usn.ubuntu.com/6238-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.17.10%2Bdfsg-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/samba@2:4.17.10%2Bdfsg-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.10%252Bdfsg-0%252Bdeb12u1%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.18.5%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.18.5%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.18.5%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
6
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2022-2127
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p1se-92ae-t3b5
132
url VCID-p33p-zg9p-nyfy
vulnerability_id VCID-p33p-zg9p-nyfy
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2125.json
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2125.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2125
reference_id
reference_type
scores
0
value 0.11667
scoring_system epss
scoring_elements 0.93636
published_at 2026-04-01T12:55:00Z
1
value 0.11667
scoring_system epss
scoring_elements 0.937
published_at 2026-04-21T12:55:00Z
2
value 0.11667
scoring_system epss
scoring_elements 0.93691
published_at 2026-04-16T12:55:00Z
3
value 0.11667
scoring_system epss
scoring_elements 0.93698
published_at 2026-04-18T12:55:00Z
4
value 0.11667
scoring_system epss
scoring_elements 0.93646
published_at 2026-04-02T12:55:00Z
5
value 0.11667
scoring_system epss
scoring_elements 0.93655
published_at 2026-04-04T12:55:00Z
6
value 0.11667
scoring_system epss
scoring_elements 0.93657
published_at 2026-04-07T12:55:00Z
7
value 0.11667
scoring_system epss
scoring_elements 0.93666
published_at 2026-04-08T12:55:00Z
8
value 0.11667
scoring_system epss
scoring_elements 0.93668
published_at 2026-04-09T12:55:00Z
9
value 0.11667
scoring_system epss
scoring_elements 0.93672
published_at 2026-04-11T12:55:00Z
10
value 0.11667
scoring_system epss
scoring_elements 0.93673
published_at 2026-04-12T12:55:00Z
11
value 0.11667
scoring_system epss
scoring_elements 0.93674
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2125
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2119
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2119
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2123
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2125
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2126
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2126
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.9
scoring_system cvssv2
scoring_elements AV:A/AC:M/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1403114
reference_id 1403114
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1403114
8
reference_url https://security.archlinux.org/ASA-201612-19
reference_id ASA-201612-19
reference_type
scores
url https://security.archlinux.org/ASA-201612-19
9
reference_url https://security.archlinux.org/AVG-111
reference_id AVG-111
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-111
10
reference_url https://access.redhat.com/errata/RHSA-2017:0494
reference_id RHSA-2017:0494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0494
11
reference_url https://access.redhat.com/errata/RHSA-2017:0495
reference_id RHSA-2017:0495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0495
12
reference_url https://access.redhat.com/errata/RHSA-2017:0662
reference_id RHSA-2017:0662
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0662
13
reference_url https://access.redhat.com/errata/RHSA-2017:0744
reference_id RHSA-2017:0744
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0744
14
reference_url https://access.redhat.com/errata/RHSA-2017:1265
reference_id RHSA-2017:1265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1265
15
reference_url https://usn.ubuntu.com/3158-1/
reference_id USN-3158-1
reference_type
scores
url https://usn.ubuntu.com/3158-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.5.2%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.5.2%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.5.2%252Bdfsg-2%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2016-2125
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p33p-zg9p-nyfy
133
url VCID-pk25-kbwm-mfcq
vulnerability_id VCID-pk25-kbwm-mfcq
summary samba: the SMB2 server does not release unused shares
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0454.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0454.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-0454
reference_id
reference_type
scores
0
value 0.01878
scoring_system epss
scoring_elements 0.83173
published_at 2026-04-21T12:55:00Z
1
value 0.01878
scoring_system epss
scoring_elements 0.8317
published_at 2026-04-18T12:55:00Z
2
value 0.01878
scoring_system epss
scoring_elements 0.83066
published_at 2026-04-01T12:55:00Z
3
value 0.01878
scoring_system epss
scoring_elements 0.83082
published_at 2026-04-02T12:55:00Z
4
value 0.01878
scoring_system epss
scoring_elements 0.83096
published_at 2026-04-04T12:55:00Z
5
value 0.01878
scoring_system epss
scoring_elements 0.83094
published_at 2026-04-07T12:55:00Z
6
value 0.01878
scoring_system epss
scoring_elements 0.83118
published_at 2026-04-08T12:55:00Z
7
value 0.01878
scoring_system epss
scoring_elements 0.83126
published_at 2026-04-09T12:55:00Z
8
value 0.01878
scoring_system epss
scoring_elements 0.83143
published_at 2026-04-11T12:55:00Z
9
value 0.01878
scoring_system epss
scoring_elements 0.83136
published_at 2026-04-12T12:55:00Z
10
value 0.01878
scoring_system epss
scoring_elements 0.83132
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-0454
2
reference_url https://bugzilla.samba.org/show_bug.cgi?id=8738
reference_id
reference_type
scores
url https://bugzilla.samba.org/show_bug.cgi?id=8738
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0454
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0454
4
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/80970
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/80970
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://lists.samba.org/archive/samba-announce/2012/000259.html
reference_id
reference_type
scores
url https://lists.samba.org/archive/samba-announce/2012/000259.html
7
reference_url https://www.samba.org/samba/security/CVE-2013-0454
reference_id
reference_type
scores
url https://www.samba.org/samba/security/CVE-2013-0454
8
reference_url http://www.ibm.com/support/docview.wss?uid=ssg1S1004289
reference_id
reference_type
scores
url http://www.ibm.com/support/docview.wss?uid=ssg1S1004289
9
reference_url http://www.ubuntu.com/usn/USN-1802-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1802-1
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=928419
reference_id 928419
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=928419
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:storwize:v7000:1.3:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:storwize:v7000:1.3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:storwize:v7000:1.3:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:storwize:v7000:1.4:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:storwize:v7000:1.4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:storwize:v7000:1.4:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-0454
reference_id CVE-2013-0454
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2013-0454
21
reference_url https://usn.ubuntu.com/1802-1/
reference_id USN-1802-1
reference_type
scores
url https://usn.ubuntu.com/1802-1/
fixed_packages
0
url pkg:deb/debian/samba@2:3.6.6-1?distro=trixie
purl pkg:deb/debian/samba@2:3.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:3.6.6-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2013-0454
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pk25-kbwm-mfcq
134
url VCID-q2d9-vahb-6qce
vulnerability_id VCID-q2d9-vahb-6qce
summary Multiple vulnerabilities have been discovered in Samba, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4154.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4154.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4154
reference_id
reference_type
scores
0
value 0.00314
scoring_system epss
scoring_elements 0.54512
published_at 2026-04-02T12:55:00Z
1
value 0.00314
scoring_system epss
scoring_elements 0.54535
published_at 2026-04-04T12:55:00Z
2
value 0.00314
scoring_system epss
scoring_elements 0.54504
published_at 2026-04-07T12:55:00Z
3
value 0.00314
scoring_system epss
scoring_elements 0.54556
published_at 2026-04-08T12:55:00Z
4
value 0.00314
scoring_system epss
scoring_elements 0.5455
published_at 2026-04-09T12:55:00Z
5
value 0.00314
scoring_system epss
scoring_elements 0.54562
published_at 2026-04-11T12:55:00Z
6
value 0.00314
scoring_system epss
scoring_elements 0.54544
published_at 2026-04-12T12:55:00Z
7
value 0.00314
scoring_system epss
scoring_elements 0.54523
published_at 2026-04-13T12:55:00Z
8
value 0.00397
scoring_system epss
scoring_elements 0.60569
published_at 2026-04-21T12:55:00Z
9
value 0.00397
scoring_system epss
scoring_elements 0.60575
published_at 2026-04-16T12:55:00Z
10
value 0.00397
scoring_system epss
scoring_elements 0.60582
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4154
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4154
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4154
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2241883
reference_id 2241883
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2241883
5
reference_url https://security.gentoo.org/glsa/202402-28
reference_id GLSA-202402-28
reference_type
scores
url https://security.gentoo.org/glsa/202402-28
6
reference_url https://usn.ubuntu.com/6425-1/
reference_id USN-6425-1
reference_type
scores
url https://usn.ubuntu.com/6425-1/
7
reference_url https://usn.ubuntu.com/6425-3/
reference_id USN-6425-3
reference_type
scores
url https://usn.ubuntu.com/6425-3/
fixed_packages
0
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.19.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.19.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.19.1%252Bdfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2023-4154
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q2d9-vahb-6qce
135
url VCID-q3qf-qtjv-cyat
vulnerability_id VCID-q3qf-qtjv-cyat
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which may allow execution of arbitrary code with root privileges.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174076.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174076.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174391.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174391.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00002.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html
10
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html
11
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5299.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5299.json
12
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5299
reference_id
reference_type
scores
0
value 0.09138
scoring_system epss
scoring_elements 0.92696
published_at 2026-04-21T12:55:00Z
1
value 0.09138
scoring_system epss
scoring_elements 0.92678
published_at 2026-04-13T12:55:00Z
2
value 0.09138
scoring_system epss
scoring_elements 0.92692
published_at 2026-04-18T12:55:00Z
3
value 0.09138
scoring_system epss
scoring_elements 0.92646
published_at 2026-04-01T12:55:00Z
4
value 0.09138
scoring_system epss
scoring_elements 0.92652
published_at 2026-04-02T12:55:00Z
5
value 0.09138
scoring_system epss
scoring_elements 0.92658
published_at 2026-04-07T12:55:00Z
6
value 0.09138
scoring_system epss
scoring_elements 0.92668
published_at 2026-04-08T12:55:00Z
7
value 0.09138
scoring_system epss
scoring_elements 0.92673
published_at 2026-04-09T12:55:00Z
8
value 0.09138
scoring_system epss
scoring_elements 0.92679
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5299
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3223
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3223
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5252
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5252
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5296
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5299
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5330
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5330
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7540
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7540
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8467
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8467
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=675fd8d771f9d43e354dba53ddd9b5483ae0a1d7
reference_id
reference_type
scores
url https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=675fd8d771f9d43e354dba53ddd9b5483ae0a1d7
22
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993
23
reference_url https://www.samba.org/samba/security/CVE-2015-5299.html
reference_id
reference_type
scores
url https://www.samba.org/samba/security/CVE-2015-5299.html
24
reference_url http://www.debian.org/security/2016/dsa-3433
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3433
25
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
26
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
27
reference_url http://www.securityfocus.com/bid/79729
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79729
28
reference_url http://www.securitytracker.com/id/1034493
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034493
29
reference_url http://www.ubuntu.com/usn/USN-2855-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2855-1
30
reference_url http://www.ubuntu.com/usn/USN-2855-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2855-2
31
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1276126
reference_id 1276126
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1276126
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-5299
reference_id CVE-2015-5299
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-5299
40
reference_url https://security.gentoo.org/glsa/201612-47
reference_id GLSA-201612-47
reference_type
scores
url https://security.gentoo.org/glsa/201612-47
41
reference_url https://access.redhat.com/errata/RHSA-2016:0006
reference_id RHSA-2016:0006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0006
42
reference_url https://access.redhat.com/errata/RHSA-2016:0010
reference_id RHSA-2016:0010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0010
43
reference_url https://access.redhat.com/errata/RHSA-2016:0011
reference_id RHSA-2016:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0011
44
reference_url https://access.redhat.com/errata/RHSA-2016:0015
reference_id RHSA-2016:0015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0015
45
reference_url https://access.redhat.com/errata/RHSA-2016:0016
reference_id RHSA-2016:0016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0016
46
reference_url https://usn.ubuntu.com/2855-1/
reference_id USN-2855-1
reference_type
scores
url https://usn.ubuntu.com/2855-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.1.22%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.1.22%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.1.22%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2015-5299
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q3qf-qtjv-cyat
136
url VCID-q4r4-cxcp-gfhq
vulnerability_id VCID-q4r4-cxcp-gfhq
summary Buffer overflow in the nss_winbind.so.1 library in Samba 3.0.21 through 3.0.23d, as used in the winbindd daemon on Solaris, allows attackers to execute arbitrary code via the (1) gethostbyname and (2) getipnodebyname functions.
references
0
reference_url http://osvdb.org/33098
reference_id
reference_type
scores
url http://osvdb.org/33098
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0453.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0453.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-0453
reference_id
reference_type
scores
0
value 0.00528
scoring_system epss
scoring_elements 0.6718
published_at 2026-04-21T12:55:00Z
1
value 0.00528
scoring_system epss
scoring_elements 0.67079
published_at 2026-04-01T12:55:00Z
2
value 0.00528
scoring_system epss
scoring_elements 0.67116
published_at 2026-04-02T12:55:00Z
3
value 0.00528
scoring_system epss
scoring_elements 0.67139
published_at 2026-04-04T12:55:00Z
4
value 0.00528
scoring_system epss
scoring_elements 0.67114
published_at 2026-04-07T12:55:00Z
5
value 0.00528
scoring_system epss
scoring_elements 0.67164
published_at 2026-04-08T12:55:00Z
6
value 0.00528
scoring_system epss
scoring_elements 0.67176
published_at 2026-04-09T12:55:00Z
7
value 0.00528
scoring_system epss
scoring_elements 0.67195
published_at 2026-04-11T12:55:00Z
8
value 0.00528
scoring_system epss
scoring_elements 0.67182
published_at 2026-04-12T12:55:00Z
9
value 0.00528
scoring_system epss
scoring_elements 0.67151
published_at 2026-04-13T12:55:00Z
10
value 0.00528
scoring_system epss
scoring_elements 0.67185
published_at 2026-04-16T12:55:00Z
11
value 0.00528
scoring_system epss
scoring_elements 0.67198
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-0453
3
reference_url http://secunia.com/advisories/24043
reference_id
reference_type
scores
url http://secunia.com/advisories/24043
4
reference_url http://secunia.com/advisories/24101
reference_id
reference_type
scores
url http://secunia.com/advisories/24101
5
reference_url http://secunia.com/advisories/24151
reference_id
reference_type
scores
url http://secunia.com/advisories/24151
6
reference_url http://securitytracker.com/id?1017589
reference_id
reference_type
scores
url http://securitytracker.com/id?1017589
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/32231
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/32231
8
reference_url https://issues.rpath.com/browse/RPL-1005
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1005
9
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.476916
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.476916
10
reference_url http://us1.samba.org/samba/security/CVE-2007-0453.html
reference_id
reference_type
scores
url http://us1.samba.org/samba/security/CVE-2007-0453.html
11
reference_url http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html
reference_id
reference_type
scores
url http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html
12
reference_url http://www.securityfocus.com/archive/1/459168/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/459168/100/0/threaded
13
reference_url http://www.securityfocus.com/archive/1/459365/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/459365/100/0/threaded
14
reference_url http://www.securityfocus.com/bid/22410
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/22410
15
reference_url http://www.trustix.org/errata/2007/0007
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0007
16
reference_url http://www.vupen.com/english/advisories/2007/0483
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/0483
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-0453
reference_id CVE-2007-0453
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-0453
fixed_packages
0
url pkg:deb/debian/samba@0?distro=trixie
purl pkg:deb/debian/samba@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@0%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2007-0453
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q4r4-cxcp-gfhq
137
url VCID-qk1z-ts4z-4fh6
vulnerability_id VCID-qk1z-ts4z-4fh6
summary The winbindd daemon in Samba 3.0.21 to 3.0.21c writes the machine trust account password in cleartext in log files, which allows local users to obtain the password and spoof the server in the domain.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-1059
reference_id
reference_type
scores
0
value 0.00456
scoring_system epss
scoring_elements 0.63824
published_at 2026-04-01T12:55:00Z
1
value 0.00456
scoring_system epss
scoring_elements 0.63883
published_at 2026-04-02T12:55:00Z
2
value 0.00456
scoring_system epss
scoring_elements 0.6391
published_at 2026-04-04T12:55:00Z
3
value 0.00456
scoring_system epss
scoring_elements 0.63867
published_at 2026-04-07T12:55:00Z
4
value 0.00456
scoring_system epss
scoring_elements 0.63918
published_at 2026-04-08T12:55:00Z
5
value 0.00456
scoring_system epss
scoring_elements 0.63935
published_at 2026-04-09T12:55:00Z
6
value 0.00456
scoring_system epss
scoring_elements 0.63948
published_at 2026-04-11T12:55:00Z
7
value 0.00456
scoring_system epss
scoring_elements 0.63934
published_at 2026-04-12T12:55:00Z
8
value 0.00456
scoring_system epss
scoring_elements 0.63901
published_at 2026-04-13T12:55:00Z
9
value 0.00456
scoring_system epss
scoring_elements 0.63936
published_at 2026-04-16T12:55:00Z
10
value 0.00456
scoring_system epss
scoring_elements 0.63946
published_at 2026-04-18T12:55:00Z
11
value 0.00456
scoring_system epss
scoring_elements 0.63937
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-1059
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1059
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1059
fixed_packages
0
url pkg:deb/debian/samba@3.0.22-1?distro=trixie
purl pkg:deb/debian/samba@3.0.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@3.0.22-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2006-1059
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qk1z-ts4z-4fh6
138
url VCID-qpmw-6wg8-gbfs
vulnerability_id VCID-qpmw-6wg8-gbfs
summary samba: World writable files in Samba AD DC private/ dir
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3870.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3870.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-3870
reference_id
reference_type
scores
0
value 0.0055
scoring_system epss
scoring_elements 0.6791
published_at 2026-04-01T12:55:00Z
1
value 0.0055
scoring_system epss
scoring_elements 0.67933
published_at 2026-04-02T12:55:00Z
2
value 0.0055
scoring_system epss
scoring_elements 0.67952
published_at 2026-04-04T12:55:00Z
3
value 0.0055
scoring_system epss
scoring_elements 0.67931
published_at 2026-04-07T12:55:00Z
4
value 0.0055
scoring_system epss
scoring_elements 0.67982
published_at 2026-04-08T12:55:00Z
5
value 0.0055
scoring_system epss
scoring_elements 0.67995
published_at 2026-04-09T12:55:00Z
6
value 0.0055
scoring_system epss
scoring_elements 0.68018
published_at 2026-04-11T12:55:00Z
7
value 0.0055
scoring_system epss
scoring_elements 0.68005
published_at 2026-04-12T12:55:00Z
8
value 0.0055
scoring_system epss
scoring_elements 0.67971
published_at 2026-04-13T12:55:00Z
9
value 0.0055
scoring_system epss
scoring_elements 0.68008
published_at 2026-04-16T12:55:00Z
10
value 0.0055
scoring_system epss
scoring_elements 0.6802
published_at 2026-04-18T12:55:00Z
11
value 0.0055
scoring_system epss
scoring_elements 0.68003
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-3870
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3870
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1689010
reference_id 1689010
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1689010
fixed_packages
0
url pkg:deb/debian/samba@2:4.9.5%2Bdfsg-3?distro=trixie
purl pkg:deb/debian/samba@2:4.9.5%2Bdfsg-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-3%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2019-3870
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qpmw-6wg8-gbfs
139
url VCID-qt4e-73xg-bqde
vulnerability_id VCID-qt4e-73xg-bqde
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14318.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14318.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14318
reference_id
reference_type
scores
0
value 0.00157
scoring_system epss
scoring_elements 0.36453
published_at 2026-04-01T12:55:00Z
1
value 0.00157
scoring_system epss
scoring_elements 0.36629
published_at 2026-04-02T12:55:00Z
2
value 0.00157
scoring_system epss
scoring_elements 0.36488
published_at 2026-04-21T12:55:00Z
3
value 0.00157
scoring_system epss
scoring_elements 0.36661
published_at 2026-04-04T12:55:00Z
4
value 0.00157
scoring_system epss
scoring_elements 0.36498
published_at 2026-04-07T12:55:00Z
5
value 0.00157
scoring_system epss
scoring_elements 0.3655
published_at 2026-04-08T12:55:00Z
6
value 0.00157
scoring_system epss
scoring_elements 0.36569
published_at 2026-04-09T12:55:00Z
7
value 0.00157
scoring_system epss
scoring_elements 0.36576
published_at 2026-04-11T12:55:00Z
8
value 0.00157
scoring_system epss
scoring_elements 0.36541
published_at 2026-04-12T12:55:00Z
9
value 0.00157
scoring_system epss
scoring_elements 0.36517
published_at 2026-04-13T12:55:00Z
10
value 0.00157
scoring_system epss
scoring_elements 0.36561
published_at 2026-04-16T12:55:00Z
11
value 0.00157
scoring_system epss
scoring_elements 0.36543
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14318
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14318
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1892631
reference_id 1892631
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T14:56:23Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=1892631
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973400
reference_id 973400
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973400
6
reference_url https://www.samba.org/samba/security/CVE-2020-14318.html
reference_id CVE-2020-14318.html
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T14:56:23Z/
url https://www.samba.org/samba/security/CVE-2020-14318.html
7
reference_url https://security.gentoo.org/glsa/202012-24
reference_id GLSA-202012-24
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T14:56:23Z/
url https://security.gentoo.org/glsa/202012-24
8
reference_url https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html
reference_id msg00015.html
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T14:56:23Z/
url https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html
9
reference_url https://access.redhat.com/errata/RHSA-2020:5439
reference_id RHSA-2020:5439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5439
10
reference_url https://access.redhat.com/errata/RHSA-2021:1647
reference_id RHSA-2021:1647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1647
11
reference_url https://access.redhat.com/errata/RHSA-2021:3723
reference_id RHSA-2021:3723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3723
12
reference_url https://usn.ubuntu.com/4611-1/
reference_id USN-4611-1
reference_type
scores
url https://usn.ubuntu.com/4611-1/
13
reference_url https://usn.ubuntu.com/4931-1/
reference_id USN-4931-1
reference_type
scores
url https://usn.ubuntu.com/4931-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.13.2%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.13.2%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.2%252Bdfsg-2%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2020-14318
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qt4e-73xg-bqde
140
url VCID-qv53-wyqw-7qh8
vulnerability_id VCID-qv53-wyqw-7qh8
summary samba: heap buffer overflow with freshness tokens in the Heimdal KDC
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5568.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5568.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5568
reference_id
reference_type
scores
0
value 0.06053
scoring_system epss
scoring_elements 0.907
published_at 2026-04-02T12:55:00Z
1
value 0.06724
scoring_system epss
scoring_elements 0.91288
published_at 2026-04-21T12:55:00Z
2
value 0.06724
scoring_system epss
scoring_elements 0.91246
published_at 2026-04-08T12:55:00Z
3
value 0.06724
scoring_system epss
scoring_elements 0.91252
published_at 2026-04-09T12:55:00Z
4
value 0.06724
scoring_system epss
scoring_elements 0.91259
published_at 2026-04-11T12:55:00Z
5
value 0.06724
scoring_system epss
scoring_elements 0.91262
published_at 2026-04-13T12:55:00Z
6
value 0.06724
scoring_system epss
scoring_elements 0.91287
published_at 2026-04-16T12:55:00Z
7
value 0.06724
scoring_system epss
scoring_elements 0.91286
published_at 2026-04-18T12:55:00Z
8
value 0.06724
scoring_system epss
scoring_elements 0.91226
published_at 2026-04-04T12:55:00Z
9
value 0.06724
scoring_system epss
scoring_elements 0.91233
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5568
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2245174
reference_id 2245174
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-29T19:44:09Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2245174
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:storage:3
reference_id cpe:/a:redhat:storage:3
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:storage:3
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
8
reference_url https://access.redhat.com/security/cve/CVE-2023-5568
reference_id CVE-2023-5568
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-29T19:44:09Z/
url https://access.redhat.com/security/cve/CVE-2023-5568
9
reference_url https://www.samba.org/samba/history/samba-4.19.2.html
reference_id samba-4.19.2.html
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-29T19:44:09Z/
url https://www.samba.org/samba/history/samba-4.19.2.html
10
reference_url https://bugzilla.samba.org/show_bug.cgi?id=15491
reference_id show_bug.cgi?id=15491
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-29T19:44:09Z/
url https://bugzilla.samba.org/show_bug.cgi?id=15491
fixed_packages
0
url pkg:deb/debian/samba@0?distro=trixie
purl pkg:deb/debian/samba@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@0%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.19.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.19.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.19.2%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
6
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2023-5568
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qv53-wyqw-7qh8
141
url VCID-qvhg-pkpb-sbcy
vulnerability_id VCID-qvhg-pkpb-sbcy
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which may allow execution of arbitrary code with root privileges.
references
0
reference_url http://badlock.org/
reference_id
reference_type
scores
url http://badlock.org/
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html
10
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00046.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00046.html
11
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html
12
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html
13
reference_url http://lists.opensuse.org/opensuse-updates/2016-05/msg00124.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-05/msg00124.html
14
reference_url http://rhn.redhat.com/errata/RHSA-2016-0611.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0611.html
15
reference_url http://rhn.redhat.com/errata/RHSA-2016-0612.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0612.html
16
reference_url http://rhn.redhat.com/errata/RHSA-2016-0613.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0613.html
17
reference_url http://rhn.redhat.com/errata/RHSA-2016-0614.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0614.html
18
reference_url http://rhn.redhat.com/errata/RHSA-2016-0618.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0618.html
19
reference_url http://rhn.redhat.com/errata/RHSA-2016-0619.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0619.html
20
reference_url http://rhn.redhat.com/errata/RHSA-2016-0620.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0620.html
21
reference_url http://rhn.redhat.com/errata/RHSA-2016-0621.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0621.html
22
reference_url http://rhn.redhat.com/errata/RHSA-2016-0623.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0623.html
23
reference_url http://rhn.redhat.com/errata/RHSA-2016-0624.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0624.html
24
reference_url http://rhn.redhat.com/errata/RHSA-2016-0625.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0625.html
25
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2110.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2110.json
26
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2110
reference_id
reference_type
scores
0
value 0.20925
scoring_system epss
scoring_elements 0.95645
published_at 2026-04-21T12:55:00Z
1
value 0.20925
scoring_system epss
scoring_elements 0.95633
published_at 2026-04-13T12:55:00Z
2
value 0.20925
scoring_system epss
scoring_elements 0.95641
published_at 2026-04-16T12:55:00Z
3
value 0.20925
scoring_system epss
scoring_elements 0.95597
published_at 2026-04-01T12:55:00Z
4
value 0.20925
scoring_system epss
scoring_elements 0.95606
published_at 2026-04-02T12:55:00Z
5
value 0.20925
scoring_system epss
scoring_elements 0.95611
published_at 2026-04-04T12:55:00Z
6
value 0.20925
scoring_system epss
scoring_elements 0.95613
published_at 2026-04-07T12:55:00Z
7
value 0.20925
scoring_system epss
scoring_elements 0.95622
published_at 2026-04-08T12:55:00Z
8
value 0.20925
scoring_system epss
scoring_elements 0.95625
published_at 2026-04-09T12:55:00Z
9
value 0.20925
scoring_system epss
scoring_elements 0.9563
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2110
27
reference_url https://bto.bluecoat.com/security-advisory/sa122
reference_id
reference_type
scores
url https://bto.bluecoat.com/security-advisory/sa122
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2114
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2114
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118
36
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
37
reference_url https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05087821
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05087821
38
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05082964
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05082964
39
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399
40
reference_url https://www.samba.org/samba/history/samba-4.2.10.html
reference_id
reference_type
scores
url https://www.samba.org/samba/history/samba-4.2.10.html
41
reference_url https://www.samba.org/samba/latest_news.html#4.4.2
reference_id
reference_type
scores
url https://www.samba.org/samba/latest_news.html#4.4.2
42
reference_url https://www.samba.org/samba/security/CVE-2016-2110.html
reference_id
reference_type
scores
url https://www.samba.org/samba/security/CVE-2016-2110.html
43
reference_url http://www.debian.org/security/2016/dsa-3548
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3548
44
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
45
reference_url http://www.securitytracker.com/id/1035533
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035533
46
reference_url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.458012
reference_id
reference_type
scores
url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.458012
47
reference_url http://www.ubuntu.com/usn/USN-2950-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2950-1
48
reference_url http://www.ubuntu.com/usn/USN-2950-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2950-2
49
reference_url http://www.ubuntu.com/usn/USN-2950-3
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2950-3
50
reference_url http://www.ubuntu.com/usn/USN-2950-4
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2950-4
51
reference_url http://www.ubuntu.com/usn/USN-2950-5
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2950-5
52
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1311893
reference_id 1311893
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1311893
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*
138
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*
139
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*
140
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*
141
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*
142
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*
143
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*
144
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*
145
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*
146
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*
147
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*
148
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*
149
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:*
150
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:*
151
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:*
152
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.15:*:*:*:*:*:*:*
153
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.16:*:*:*:*:*:*:*
154
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*
155
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*
156
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*
157
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*
158
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*
159
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*
160
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*
161
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*
162
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*
163
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*
164
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*
165
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*
166
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.12:*:*:*:*:*:*:*
167
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.13:*:*:*:*:*:*:*
168
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.14:*:*:*:*:*:*:*
169
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.15:*:*:*:*:*:*:*
170
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.16:*:*:*:*:*:*:*
171
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.17:*:*:*:*:*:*:*
172
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*
173
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*
174
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*
175
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*
176
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*
177
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*
178
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*
179
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*
180
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*
181
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*
182
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*
183
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*
184
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*
185
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*
186
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.14:*:*:*:*:*:*:*
187
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.15:*:*:*:*:*:*:*
188
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.16:*:*:*:*:*:*:*
189
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.17:*:*:*:*:*:*:*
190
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.18:*:*:*:*:*:*:*
191
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.19:*:*:*:*:*:*:*
192
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*
193
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.20:*:*:*:*:*:*:*
194
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.21:*:*:*:*:*:*:*
195
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.22:*:*:*:*:*:*:*
196
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*
197
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*
198
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*
199
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*
200
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*
201
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*
202
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*
203
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*
204
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*
205
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*
206
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*
207
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*
208
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*
209
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*
210
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*
211
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*
212
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*
213
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*
214
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*
215
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*
216
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*
217
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*
218
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*
219
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*
220
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.24:*:*:*:*:*:*:*
221
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.25:*:*:*:*:*:*:*
222
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*
223
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*
224
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*
225
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*
226
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*
227
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*
228
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*
229
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
230
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*
231
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*
232
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*
233
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*
234
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*
235
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*
236
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*
237
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*
238
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*
239
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*
240
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*
241
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*
242
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*
243
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*
244
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*
245
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*
246
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*
247
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.25:*:*:*:*:*:*:*
248
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.26:*:*:*:*:*:*:*
249
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*
250
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*
251
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*
252
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*
253
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*
254
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*
255
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*
256
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*
257
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*
258
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*
259
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*
260
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*
261
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*
262
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*
263
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*
264
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*
265
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*
266
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*
267
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*
268
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*
269
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*
270
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*
271
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*
272
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.23:*:*:*:*:*:*:*
273
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*
274
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*
275
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*
276
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*
277
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*
278
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*
279
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*
280
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*
281
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*
282
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*
283
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*
284
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*
285
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*
286
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*
287
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*
288
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*
289
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*
290
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*
291
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*
292
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.9:*:*:*:*:*:*:*
293
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*
294
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*
295
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*
296
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*
297
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*
298
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*
299
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.6:*:*:*:*:*:*:*
300
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:*:*:*:*:*:*:*
301
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
302
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
303
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
304
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-2110
reference_id CVE-2016-2110
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-2110
305
reference_url https://security.gentoo.org/glsa/201612-47
reference_id GLSA-201612-47
reference_type
scores
url https://security.gentoo.org/glsa/201612-47
306
reference_url https://access.redhat.com/errata/RHSA-2016:0611
reference_id RHSA-2016:0611
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0611
307
reference_url https://access.redhat.com/errata/RHSA-2016:0612
reference_id RHSA-2016:0612
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0612
308
reference_url https://access.redhat.com/errata/RHSA-2016:0613
reference_id RHSA-2016:0613
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0613
309
reference_url https://access.redhat.com/errata/RHSA-2016:0614
reference_id RHSA-2016:0614
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0614
310
reference_url https://access.redhat.com/errata/RHSA-2016:0618
reference_id RHSA-2016:0618
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0618
311
reference_url https://access.redhat.com/errata/RHSA-2016:0619
reference_id RHSA-2016:0619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0619
312
reference_url https://access.redhat.com/errata/RHSA-2016:0620
reference_id RHSA-2016:0620
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0620
313
reference_url https://access.redhat.com/errata/RHSA-2016:0621
reference_id RHSA-2016:0621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0621
314
reference_url https://access.redhat.com/errata/RHSA-2016:0623
reference_id RHSA-2016:0623
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0623
315
reference_url https://access.redhat.com/errata/RHSA-2016:0624
reference_id RHSA-2016:0624
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0624
316
reference_url https://access.redhat.com/errata/RHSA-2016:0625
reference_id RHSA-2016:0625
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0625
317
reference_url https://usn.ubuntu.com/2950-1/
reference_id USN-2950-1
reference_type
scores
url https://usn.ubuntu.com/2950-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.3.7%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.3.7%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.3.7%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2016-2110
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qvhg-pkpb-sbcy
142
url VCID-qx51-4w39-hyd3
vulnerability_id VCID-qx51-4w39-hyd3
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1139.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1139.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1139
reference_id
reference_type
scores
0
value 0.0162
scoring_system epss
scoring_elements 0.81759
published_at 2026-04-01T12:55:00Z
1
value 0.0162
scoring_system epss
scoring_elements 0.81769
published_at 2026-04-02T12:55:00Z
2
value 0.0162
scoring_system epss
scoring_elements 0.81793
published_at 2026-04-04T12:55:00Z
3
value 0.0162
scoring_system epss
scoring_elements 0.8179
published_at 2026-04-07T12:55:00Z
4
value 0.0162
scoring_system epss
scoring_elements 0.81817
published_at 2026-04-08T12:55:00Z
5
value 0.0162
scoring_system epss
scoring_elements 0.81823
published_at 2026-04-09T12:55:00Z
6
value 0.0162
scoring_system epss
scoring_elements 0.81842
published_at 2026-04-11T12:55:00Z
7
value 0.0162
scoring_system epss
scoring_elements 0.8183
published_at 2026-04-12T12:55:00Z
8
value 0.0162
scoring_system epss
scoring_elements 0.81824
published_at 2026-04-13T12:55:00Z
9
value 0.0162
scoring_system epss
scoring_elements 0.8186
published_at 2026-04-16T12:55:00Z
10
value 0.0162
scoring_system epss
scoring_elements 0.81861
published_at 2026-04-18T12:55:00Z
11
value 0.0162
scoring_system epss
scoring_elements 0.81864
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1139
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1139
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1589651
reference_id 1589651
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1589651
5
reference_url https://security.gentoo.org/glsa/202003-52
reference_id GLSA-202003-52
reference_type
scores
url https://security.gentoo.org/glsa/202003-52
6
reference_url https://access.redhat.com/errata/RHSA-2018:2612
reference_id RHSA-2018:2612
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2612
7
reference_url https://access.redhat.com/errata/RHSA-2018:2613
reference_id RHSA-2018:2613
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2613
8
reference_url https://access.redhat.com/errata/RHSA-2018:3056
reference_id RHSA-2018:3056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3056
9
reference_url https://usn.ubuntu.com/3738-1/
reference_id USN-3738-1
reference_type
scores
url https://usn.ubuntu.com/3738-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.8.4%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.8.4%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.8.4%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2018-1139
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qx51-4w39-hyd3
143
url VCID-qz74-dd9f-kqaz
vulnerability_id VCID-qz74-dd9f-kqaz
summary
Multiple vulnerabilities were found in mount-cifs, the worst of
    which leading to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0547.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0547.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0547
reference_id
reference_type
scores
0
value 0.01541
scoring_system epss
scoring_elements 0.81309
published_at 2026-04-01T12:55:00Z
1
value 0.01541
scoring_system epss
scoring_elements 0.81318
published_at 2026-04-02T12:55:00Z
2
value 0.01541
scoring_system epss
scoring_elements 0.81341
published_at 2026-04-04T12:55:00Z
3
value 0.01541
scoring_system epss
scoring_elements 0.81339
published_at 2026-04-07T12:55:00Z
4
value 0.01541
scoring_system epss
scoring_elements 0.81367
published_at 2026-04-08T12:55:00Z
5
value 0.01541
scoring_system epss
scoring_elements 0.81372
published_at 2026-04-13T12:55:00Z
6
value 0.01541
scoring_system epss
scoring_elements 0.81394
published_at 2026-04-11T12:55:00Z
7
value 0.01541
scoring_system epss
scoring_elements 0.8138
published_at 2026-04-12T12:55:00Z
8
value 0.01541
scoring_system epss
scoring_elements 0.8141
published_at 2026-04-18T12:55:00Z
9
value 0.01541
scoring_system epss
scoring_elements 0.81411
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0547
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0547
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=562156
reference_id 562156
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=562156
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=568942
reference_id 568942
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=568942
5
reference_url https://security.gentoo.org/glsa/201206-29
reference_id GLSA-201206-29
reference_type
scores
url https://security.gentoo.org/glsa/201206-29
6
reference_url https://access.redhat.com/errata/RHSA-2011:1219
reference_id RHSA-2011:1219
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1219
fixed_packages
0
url pkg:deb/debian/samba@2:3.4.5~dfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:3.4.5~dfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:3.4.5~dfsg-2%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2010-0547
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qz74-dd9f-kqaz
144
url VCID-r1t3-b4pw-f7b8
vulnerability_id VCID-r1t3-b4pw-f7b8
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which may allow execution of arbitrary code with root privileges.
references
0
reference_url http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html
1
reference_url http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047650.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047650.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047697.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047697.html
4
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047758.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047758.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
7
reference_url http://marc.info/?l=bugtraq&m=130835366526620&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=130835366526620&w=2
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3069.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3069.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3069
reference_id
reference_type
scores
0
value 0.16564
scoring_system epss
scoring_elements 0.9493
published_at 2026-04-21T12:55:00Z
1
value 0.16564
scoring_system epss
scoring_elements 0.94879
published_at 2026-04-01T12:55:00Z
2
value 0.16564
scoring_system epss
scoring_elements 0.94888
published_at 2026-04-02T12:55:00Z
3
value 0.16564
scoring_system epss
scoring_elements 0.94891
published_at 2026-04-04T12:55:00Z
4
value 0.16564
scoring_system epss
scoring_elements 0.94892
published_at 2026-04-07T12:55:00Z
5
value 0.16564
scoring_system epss
scoring_elements 0.94902
published_at 2026-04-08T12:55:00Z
6
value 0.16564
scoring_system epss
scoring_elements 0.94906
published_at 2026-04-09T12:55:00Z
7
value 0.16564
scoring_system epss
scoring_elements 0.94911
published_at 2026-04-11T12:55:00Z
8
value 0.16564
scoring_system epss
scoring_elements 0.94913
published_at 2026-04-12T12:55:00Z
9
value 0.16564
scoring_system epss
scoring_elements 0.94915
published_at 2026-04-13T12:55:00Z
10
value 0.16564
scoring_system epss
scoring_elements 0.94922
published_at 2026-04-16T12:55:00Z
11
value 0.16564
scoring_system epss
scoring_elements 0.94926
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3069
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3069
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3069
11
reference_url http://secunia.com/advisories/41354
reference_id
reference_type
scores
url http://secunia.com/advisories/41354
12
reference_url http://secunia.com/advisories/41447
reference_id
reference_type
scores
url http://secunia.com/advisories/41447
13
reference_url http://secunia.com/advisories/42531
reference_id
reference_type
scores
url http://secunia.com/advisories/42531
14
reference_url http://secunia.com/advisories/42885
reference_id
reference_type
scores
url http://secunia.com/advisories/42885
15
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/61773
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/61773
16
reference_url http://support.apple.com/kb/HT4581
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4581
17
reference_url http://support.apple.com/kb/HT4723
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4723
18
reference_url http://us1.samba.org/samba/history/samba-3.5.5.html
reference_id
reference_type
scores
url http://us1.samba.org/samba/history/samba-3.5.5.html
19
reference_url http://us1.samba.org/samba/security/CVE-2010-3069.html
reference_id
reference_type
scores
url http://us1.samba.org/samba/security/CVE-2010-3069.html
20
reference_url http://www.redhat.com/support/errata/RHSA-2010-0860.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0860.html
21
reference_url http://www.securityfocus.com/archive/1/515055/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/515055/100/0/threaded
22
reference_url http://www.securityfocus.com/bid/43212
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/43212
23
reference_url http://www.securitytracker.com/id?1024434
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1024434
24
reference_url http://www.ubuntu.com/usn/USN-987-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-987-1
25
reference_url http://www.vmware.com/security/advisories/VMSA-2010-0019.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2010-0019.html
26
reference_url http://www.vupen.com/english/advisories/2010/2378
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2378
27
reference_url http://www.vupen.com/english/advisories/2010/3126
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3126
28
reference_url http://www.vupen.com/english/advisories/2011/0091
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0091
29
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=596891
reference_id 596891
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=596891
30
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=630869
reference_id 630869
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=630869
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3069
reference_id CVE-2010-3069
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-3069
38
reference_url https://security.gentoo.org/glsa/201206-22
reference_id GLSA-201206-22
reference_type
scores
url https://security.gentoo.org/glsa/201206-22
39
reference_url https://access.redhat.com/errata/RHSA-2010:0697
reference_id RHSA-2010:0697
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0697
40
reference_url https://access.redhat.com/errata/RHSA-2010:0698
reference_id RHSA-2010:0698
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0698
41
reference_url https://access.redhat.com/errata/RHSA-2010:0860
reference_id RHSA-2010:0860
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0860
42
reference_url https://usn.ubuntu.com/987-1/
reference_id USN-987-1
reference_type
scores
url https://usn.ubuntu.com/987-1/
fixed_packages
0
url pkg:deb/debian/samba@2:3.5.5~dfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:3.5.5~dfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:3.5.5~dfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2010-3069
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r1t3-b4pw-f7b8
145
url VCID-r6dg-tbre-5fer
vulnerability_id VCID-r6dg-tbre-5fer
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which may allow execution of arbitrary code with root privileges.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174076.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174076.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174391.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174391.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7540.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7540.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7540
reference_id
reference_type
scores
0
value 0.43299
scoring_system epss
scoring_elements 0.97513
published_at 2026-04-21T12:55:00Z
1
value 0.43299
scoring_system epss
scoring_elements 0.97512
published_at 2026-04-18T12:55:00Z
2
value 0.43299
scoring_system epss
scoring_elements 0.97478
published_at 2026-04-01T12:55:00Z
3
value 0.43299
scoring_system epss
scoring_elements 0.97485
published_at 2026-04-02T12:55:00Z
4
value 0.43299
scoring_system epss
scoring_elements 0.97489
published_at 2026-04-07T12:55:00Z
5
value 0.43299
scoring_system epss
scoring_elements 0.97495
published_at 2026-04-08T12:55:00Z
6
value 0.43299
scoring_system epss
scoring_elements 0.97496
published_at 2026-04-09T12:55:00Z
7
value 0.43299
scoring_system epss
scoring_elements 0.975
published_at 2026-04-11T12:55:00Z
8
value 0.43299
scoring_system epss
scoring_elements 0.97502
published_at 2026-04-12T12:55:00Z
9
value 0.43299
scoring_system epss
scoring_elements 0.97503
published_at 2026-04-13T12:55:00Z
10
value 0.43299
scoring_system epss
scoring_elements 0.97511
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7540
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3223
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3223
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5252
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5252
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5296
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5299
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5330
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5330
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7540
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7540
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8467
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8467
12
reference_url https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=530d50a1abdcdf4d1775652d4c456c1274d83d8d
reference_id
reference_type
scores
url https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=530d50a1abdcdf4d1775652d4c456c1274d83d8d
13
reference_url https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=9d989c9dd7a5b92d0c5d65287935471b83b6e884
reference_id
reference_type
scores
url https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=9d989c9dd7a5b92d0c5d65287935471b83b6e884
14
reference_url https://www.samba.org/samba/security/CVE-2015-7540.html
reference_id
reference_type
scores
url https://www.samba.org/samba/security/CVE-2015-7540.html
15
reference_url http://www.debian.org/security/2016/dsa-3433
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3433
16
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
17
reference_url http://www.securityfocus.com/bid/79736
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79736
18
reference_url http://www.securitytracker.com/id/1034492
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034492
19
reference_url http://www.ubuntu.com/usn/USN-2855-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2855-1
20
reference_url http://www.ubuntu.com/usn/USN-2855-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2855-2
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1288451
reference_id 1288451
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1288451
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7540
reference_id CVE-2015-7540
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-7540
30
reference_url https://security.gentoo.org/glsa/201612-47
reference_id GLSA-201612-47
reference_type
scores
url https://security.gentoo.org/glsa/201612-47
31
reference_url https://access.redhat.com/errata/RHSA-2016:0010
reference_id RHSA-2016:0010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0010
32
reference_url https://access.redhat.com/errata/RHSA-2016:0015
reference_id RHSA-2016:0015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0015
33
reference_url https://usn.ubuntu.com/2855-1/
reference_id USN-2855-1
reference_type
scores
url https://usn.ubuntu.com/2855-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.1.22%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.1.22%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.1.22%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2015-7540
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r6dg-tbre-5fer
146
url VCID-r7va-6j6s-rba5
vulnerability_id VCID-r7va-6j6s-rba5
summary Multiple vulnerabilities have been discovered in Samba, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42669.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42669.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42669
reference_id
reference_type
scores
0
value 0.00578
scoring_system epss
scoring_elements 0.68889
published_at 2026-04-18T12:55:00Z
1
value 0.00578
scoring_system epss
scoring_elements 0.68839
published_at 2026-04-08T12:55:00Z
2
value 0.00578
scoring_system epss
scoring_elements 0.68858
published_at 2026-04-09T12:55:00Z
3
value 0.00578
scoring_system epss
scoring_elements 0.6888
published_at 2026-04-11T12:55:00Z
4
value 0.00578
scoring_system epss
scoring_elements 0.68866
published_at 2026-04-21T12:55:00Z
5
value 0.00578
scoring_system epss
scoring_elements 0.68837
published_at 2026-04-13T12:55:00Z
6
value 0.00578
scoring_system epss
scoring_elements 0.68878
published_at 2026-04-16T12:55:00Z
7
value 0.00578
scoring_system epss
scoring_elements 0.68789
published_at 2026-04-02T12:55:00Z
8
value 0.00578
scoring_system epss
scoring_elements 0.6881
published_at 2026-04-04T12:55:00Z
9
value 0.00578
scoring_system epss
scoring_elements 0.68788
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42669
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42669
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2241884
reference_id 2241884
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-30T14:56:59Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2241884
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::resilientstorage
reference_id cpe:/a:redhat:enterprise_linux:9::resilientstorage
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::resilientstorage
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb
reference_id cpe:/a:redhat:rhel_eus:8.6::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb
reference_id cpe:/a:redhat:rhel_eus:8.8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
reference_id cpe:/a:redhat:rhel_eus:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb
reference_id cpe:/a:redhat:rhel_eus:9.0::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::resilientstorage
reference_id cpe:/a:redhat:rhel_eus:9.0::resilientstorage
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::resilientstorage
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb
reference_id cpe:/a:redhat:rhel_eus:9.2::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::resilientstorage
reference_id cpe:/a:redhat:rhel_eus:9.2::resilientstorage
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::resilientstorage
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:storage:3
reference_id cpe:/a:redhat:storage:3
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:storage:3
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos
reference_id cpe:/o:redhat:rhel_eus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.0::baseos
reference_id cpe:/o:redhat:rhel_eus:9.0::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.0::baseos
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
reference_id cpe:/o:redhat:rhel_eus:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8
reference_id cpe:/o:redhat:rhev_hypervisor:4.4::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8
30
reference_url https://access.redhat.com/security/cve/CVE-2023-42669
reference_id CVE-2023-42669
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-30T14:56:59Z/
url https://access.redhat.com/security/cve/CVE-2023-42669
31
reference_url https://www.samba.org/samba/security/CVE-2023-42669.html
reference_id CVE-2023-42669.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-30T14:56:59Z/
url https://www.samba.org/samba/security/CVE-2023-42669.html
32
reference_url https://security.gentoo.org/glsa/202402-28
reference_id GLSA-202402-28
reference_type
scores
url https://security.gentoo.org/glsa/202402-28
33
reference_url https://access.redhat.com/errata/RHSA-2023:6209
reference_id RHSA-2023:6209
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-30T14:56:59Z/
url https://access.redhat.com/errata/RHSA-2023:6209
34
reference_url https://access.redhat.com/errata/RHSA-2023:6744
reference_id RHSA-2023:6744
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-30T14:56:59Z/
url https://access.redhat.com/errata/RHSA-2023:6744
35
reference_url https://access.redhat.com/errata/RHSA-2023:7371
reference_id RHSA-2023:7371
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-30T14:56:59Z/
url https://access.redhat.com/errata/RHSA-2023:7371
36
reference_url https://access.redhat.com/errata/RHSA-2023:7408
reference_id RHSA-2023:7408
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-30T14:56:59Z/
url https://access.redhat.com/errata/RHSA-2023:7408
37
reference_url https://access.redhat.com/errata/RHSA-2023:7464
reference_id RHSA-2023:7464
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-30T14:56:59Z/
url https://access.redhat.com/errata/RHSA-2023:7464
38
reference_url https://access.redhat.com/errata/RHSA-2023:7467
reference_id RHSA-2023:7467
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-30T14:56:59Z/
url https://access.redhat.com/errata/RHSA-2023:7467
39
reference_url https://bugzilla.samba.org/show_bug.cgi?id=15474
reference_id show_bug.cgi?id=15474
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-30T14:56:59Z/
url https://bugzilla.samba.org/show_bug.cgi?id=15474
40
reference_url https://usn.ubuntu.com/6425-1/
reference_id USN-6425-1
reference_type
scores
url https://usn.ubuntu.com/6425-1/
41
reference_url https://usn.ubuntu.com/6425-3/
reference_id USN-6425-3
reference_type
scores
url https://usn.ubuntu.com/6425-3/
fixed_packages
0
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.19.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.19.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.19.1%252Bdfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2023-42669
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r7va-6j6s-rba5
147
url VCID-rgu3-rgej-aucp
vulnerability_id VCID-rgu3-rgej-aucp
summary Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32745.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32745.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32745
reference_id
reference_type
scores
0
value 0.00425
scoring_system epss
scoring_elements 0.62244
published_at 2026-04-21T12:55:00Z
1
value 0.00425
scoring_system epss
scoring_elements 0.62207
published_at 2026-04-13T12:55:00Z
2
value 0.00425
scoring_system epss
scoring_elements 0.62253
published_at 2026-04-16T12:55:00Z
3
value 0.00425
scoring_system epss
scoring_elements 0.6226
published_at 2026-04-18T12:55:00Z
4
value 0.00425
scoring_system epss
scoring_elements 0.62185
published_at 2026-04-04T12:55:00Z
5
value 0.00425
scoring_system epss
scoring_elements 0.62153
published_at 2026-04-07T12:55:00Z
6
value 0.00425
scoring_system epss
scoring_elements 0.62203
published_at 2026-04-08T12:55:00Z
7
value 0.00425
scoring_system epss
scoring_elements 0.62221
published_at 2026-04-09T12:55:00Z
8
value 0.00425
scoring_system epss
scoring_elements 0.62238
published_at 2026-04-11T12:55:00Z
9
value 0.00425
scoring_system epss
scoring_elements 0.62228
published_at 2026-04-12T12:55:00Z
10
value 0.00555
scoring_system epss
scoring_elements 0.68055
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32745
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449
reference_id 1016449
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2108211
reference_id 2108211
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2108211
10
reference_url https://security.archlinux.org/AVG-2782
reference_id AVG-2782
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2782
11
reference_url https://security.gentoo.org/glsa/202309-06
reference_id GLSA-202309-06
reference_type
scores
url https://security.gentoo.org/glsa/202309-06
12
reference_url https://usn.ubuntu.com/5542-1/
reference_id USN-5542-1
reference_type
scores
url https://usn.ubuntu.com/5542-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u5?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u5%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.16.4%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.16.4%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.16.4%252Bdfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
6
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2022-32745
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rgu3-rgej-aucp
148
url VCID-rnfg-1cgy-jbaq
vulnerability_id VCID-rnfg-1cgy-jbaq
summary Multiple vulnerabilities have been discovered in Samba, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34966.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34966.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-34966
reference_id
reference_type
scores
0
value 0.13565
scoring_system epss
scoring_elements 0.94252
published_at 2026-04-21T12:55:00Z
1
value 0.15899
scoring_system epss
scoring_elements 0.94725
published_at 2026-04-02T12:55:00Z
2
value 0.15899
scoring_system epss
scoring_elements 0.94729
published_at 2026-04-04T12:55:00Z
3
value 0.15899
scoring_system epss
scoring_elements 0.9473
published_at 2026-04-07T12:55:00Z
4
value 0.15899
scoring_system epss
scoring_elements 0.9474
published_at 2026-04-08T12:55:00Z
5
value 0.15899
scoring_system epss
scoring_elements 0.94744
published_at 2026-04-09T12:55:00Z
6
value 0.15899
scoring_system epss
scoring_elements 0.94748
published_at 2026-04-11T12:55:00Z
7
value 0.15899
scoring_system epss
scoring_elements 0.94752
published_at 2026-04-13T12:55:00Z
8
value 0.15899
scoring_system epss
scoring_elements 0.94761
published_at 2026-04-16T12:55:00Z
9
value 0.15899
scoring_system epss
scoring_elements 0.94764
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-34966
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2222793
reference_id 2222793
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2222793
10
reference_url https://security.gentoo.org/glsa/202402-28
reference_id GLSA-202402-28
reference_type
scores
url https://security.gentoo.org/glsa/202402-28
11
reference_url https://access.redhat.com/errata/RHSA-2023:6667
reference_id RHSA-2023:6667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6667
12
reference_url https://access.redhat.com/errata/RHSA-2023:7139
reference_id RHSA-2023:7139
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7139
13
reference_url https://access.redhat.com/errata/RHSA-2024:0423
reference_id RHSA-2024:0423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0423
14
reference_url https://access.redhat.com/errata/RHSA-2024:0580
reference_id RHSA-2024:0580
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0580
15
reference_url https://access.redhat.com/errata/RHSA-2024:4101
reference_id RHSA-2024:4101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4101
16
reference_url https://usn.ubuntu.com/6238-1/
reference_id USN-6238-1
reference_type
scores
url https://usn.ubuntu.com/6238-1/
17
reference_url https://usn.ubuntu.com/7582-1/
reference_id USN-7582-1
reference_type
scores
url https://usn.ubuntu.com/7582-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.17.10%2Bdfsg-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/samba@2:4.17.10%2Bdfsg-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.10%252Bdfsg-0%252Bdeb12u1%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.18.5%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.18.5%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.18.5%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
6
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2023-34966
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rnfg-1cgy-jbaq
149
url VCID-rphh-hzna-nbgf
vulnerability_id VCID-rphh-hzna-nbgf
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10760.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10760.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-10760
reference_id
reference_type
scores
0
value 0.02353
scoring_system epss
scoring_elements 0.84829
published_at 2026-04-01T12:55:00Z
1
value 0.02353
scoring_system epss
scoring_elements 0.84926
published_at 2026-04-21T12:55:00Z
2
value 0.02353
scoring_system epss
scoring_elements 0.84927
published_at 2026-04-16T12:55:00Z
3
value 0.02353
scoring_system epss
scoring_elements 0.84928
published_at 2026-04-18T12:55:00Z
4
value 0.02353
scoring_system epss
scoring_elements 0.84845
published_at 2026-04-02T12:55:00Z
5
value 0.02353
scoring_system epss
scoring_elements 0.84863
published_at 2026-04-04T12:55:00Z
6
value 0.02353
scoring_system epss
scoring_elements 0.84864
published_at 2026-04-07T12:55:00Z
7
value 0.02353
scoring_system epss
scoring_elements 0.84887
published_at 2026-04-08T12:55:00Z
8
value 0.02353
scoring_system epss
scoring_elements 0.84894
published_at 2026-04-09T12:55:00Z
9
value 0.02353
scoring_system epss
scoring_elements 0.84913
published_at 2026-04-11T12:55:00Z
10
value 0.02353
scoring_system epss
scoring_elements 0.84911
published_at 2026-04-12T12:55:00Z
11
value 0.02353
scoring_system epss
scoring_elements 0.84905
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-10760
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10760
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1849509
reference_id 1849509
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1849509
5
reference_url https://security.archlinux.org/AVG-1202
reference_id AVG-1202
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1202
6
reference_url https://security.gentoo.org/glsa/202007-15
reference_id GLSA-202007-15
reference_type
scores
url https://security.gentoo.org/glsa/202007-15
7
reference_url https://usn.ubuntu.com/4409-1/
reference_id USN-4409-1
reference_type
scores
url https://usn.ubuntu.com/4409-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.12.5%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.12.5%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.12.5%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2020-10760
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rphh-hzna-nbgf
150
url VCID-rvux-gcuh-vuca
vulnerability_id VCID-rvux-gcuh-vuca
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14746.json
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14746.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-14746
reference_id
reference_type
scores
0
value 0.31253
scoring_system epss
scoring_elements 0.96777
published_at 2026-04-21T12:55:00Z
1
value 0.31253
scoring_system epss
scoring_elements 0.96762
published_at 2026-04-12T12:55:00Z
2
value 0.31253
scoring_system epss
scoring_elements 0.96765
published_at 2026-04-13T12:55:00Z
3
value 0.31253
scoring_system epss
scoring_elements 0.9677
published_at 2026-04-16T12:55:00Z
4
value 0.31253
scoring_system epss
scoring_elements 0.96775
published_at 2026-04-18T12:55:00Z
5
value 0.32893
scoring_system epss
scoring_elements 0.96879
published_at 2026-04-09T12:55:00Z
6
value 0.42986
scoring_system epss
scoring_elements 0.97462
published_at 2026-04-01T12:55:00Z
7
value 0.42986
scoring_system epss
scoring_elements 0.97469
published_at 2026-04-02T12:55:00Z
8
value 0.42986
scoring_system epss
scoring_elements 0.97473
published_at 2026-04-04T12:55:00Z
9
value 0.42986
scoring_system epss
scoring_elements 0.97474
published_at 2026-04-07T12:55:00Z
10
value 0.42986
scoring_system epss
scoring_elements 0.9748
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-14746
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14746
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15275
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15275
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03817en_us
reference_id
reference_type
scores
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03817en_us
6
reference_url https://www.debian.org/security/2017/dsa-4043
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-4043
7
reference_url https://www.samba.org/samba/security/CVE-2017-14746.html
reference_id
reference_type
scores
url https://www.samba.org/samba/security/CVE-2017-14746.html
8
reference_url https://www.synology.com/support/security/Synology_SA_17_72_Samba
reference_id
reference_type
scores
url https://www.synology.com/support/security/Synology_SA_17_72_Samba
9
reference_url http://www.securityfocus.com/bid/101907
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101907
10
reference_url http://www.securitytracker.com/id/1039856
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039856
11
reference_url http://www.ubuntu.com/usn/USN-3486-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3486-1
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1511899
reference_id 1511899
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1511899
13
reference_url https://security.archlinux.org/ASA-201712-1
reference_id ASA-201712-1
reference_type
scores
url https://security.archlinux.org/ASA-201712-1
14
reference_url https://security.archlinux.org/AVG-535
reference_id AVG-535
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-535
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-14746
reference_id CVE-2017-14746
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-14746
29
reference_url https://security.gentoo.org/glsa/201805-07
reference_id GLSA-201805-07
reference_type
scores
url https://security.gentoo.org/glsa/201805-07
30
reference_url https://access.redhat.com/errata/RHSA-2017:3260
reference_id RHSA-2017:3260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3260
31
reference_url https://access.redhat.com/errata/RHSA-2017:3261
reference_id RHSA-2017:3261
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3261
32
reference_url https://access.redhat.com/errata/RHSA-2017:3278
reference_id RHSA-2017:3278
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3278
33
reference_url https://usn.ubuntu.com/3486-1/
reference_id USN-3486-1
reference_type
scores
url https://usn.ubuntu.com/3486-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.7.1%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.7.1%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.7.1%252Bdfsg-2%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2017-14746
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rvux-gcuh-vuca
151
url VCID-s238-xmfb-2ueg
vulnerability_id VCID-s238-xmfb-2ueg
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which may allow execution of arbitrary code with root privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2724.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2724.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-2724
reference_id
reference_type
scores
0
value 0.01116
scoring_system epss
scoring_elements 0.78218
published_at 2026-04-21T12:55:00Z
1
value 0.01116
scoring_system epss
scoring_elements 0.78136
published_at 2026-04-01T12:55:00Z
2
value 0.01116
scoring_system epss
scoring_elements 0.78144
published_at 2026-04-02T12:55:00Z
3
value 0.01116
scoring_system epss
scoring_elements 0.78173
published_at 2026-04-04T12:55:00Z
4
value 0.01116
scoring_system epss
scoring_elements 0.78156
published_at 2026-04-07T12:55:00Z
5
value 0.01116
scoring_system epss
scoring_elements 0.78182
published_at 2026-04-08T12:55:00Z
6
value 0.01116
scoring_system epss
scoring_elements 0.78188
published_at 2026-04-09T12:55:00Z
7
value 0.01116
scoring_system epss
scoring_elements 0.78214
published_at 2026-04-11T12:55:00Z
8
value 0.01116
scoring_system epss
scoring_elements 0.78197
published_at 2026-04-12T12:55:00Z
9
value 0.01116
scoring_system epss
scoring_elements 0.78193
published_at 2026-04-13T12:55:00Z
10
value 0.01116
scoring_system epss
scoring_elements 0.78225
published_at 2026-04-16T12:55:00Z
11
value 0.01116
scoring_system epss
scoring_elements 0.78223
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-2724
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2724
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2724
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=726691
reference_id 726691
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=726691
5
reference_url https://security.gentoo.org/glsa/201206-22
reference_id GLSA-201206-22
reference_type
scores
url https://security.gentoo.org/glsa/201206-22
6
reference_url https://access.redhat.com/errata/RHSA-2011:1220
reference_id RHSA-2011:1220
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1220
7
reference_url https://access.redhat.com/errata/RHSA-2011:1221
reference_id RHSA-2011:1221
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1221
8
reference_url https://usn.ubuntu.com/1226-1/
reference_id USN-1226-1
reference_type
scores
url https://usn.ubuntu.com/1226-1/
9
reference_url https://usn.ubuntu.com/1226-2/
reference_id USN-1226-2
reference_type
scores
url https://usn.ubuntu.com/1226-2/
fixed_packages
0
url pkg:deb/debian/samba@2:3.4.7~dfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:3.4.7~dfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:3.4.7~dfsg-2%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2011-2724
risk_score 0.9
exploitability 0.5
weighted_severity 1.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s238-xmfb-2ueg
152
url VCID-s2ne-rcp3-nbgz
vulnerability_id VCID-s2ne-rcp3-nbgz
summary Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3437.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3437.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3437
reference_id
reference_type
scores
0
value 0.00725
scoring_system epss
scoring_elements 0.72612
published_at 2026-04-21T12:55:00Z
1
value 0.00725
scoring_system epss
scoring_elements 0.72529
published_at 2026-04-02T12:55:00Z
2
value 0.00725
scoring_system epss
scoring_elements 0.72545
published_at 2026-04-04T12:55:00Z
3
value 0.00725
scoring_system epss
scoring_elements 0.72522
published_at 2026-04-07T12:55:00Z
4
value 0.00725
scoring_system epss
scoring_elements 0.7256
published_at 2026-04-08T12:55:00Z
5
value 0.00725
scoring_system epss
scoring_elements 0.72572
published_at 2026-04-09T12:55:00Z
6
value 0.00725
scoring_system epss
scoring_elements 0.72596
published_at 2026-04-11T12:55:00Z
7
value 0.00725
scoring_system epss
scoring_elements 0.72579
published_at 2026-04-12T12:55:00Z
8
value 0.00725
scoring_system epss
scoring_elements 0.72568
published_at 2026-04-13T12:55:00Z
9
value 0.00725
scoring_system epss
scoring_elements 0.7261
published_at 2026-04-16T12:55:00Z
10
value 0.00725
scoring_system epss
scoring_elements 0.72621
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3437
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url http://www.openwall.com/lists/oss-security/2023/02/08/1
reference_id 1
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/
url http://www.openwall.com/lists/oss-security/2023/02/08/1
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187
reference_id 1024187
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2137774
reference_id 2137774
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2137774
17
reference_url https://security.archlinux.org/AVG-2828
reference_id AVG-2828
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2828
18
reference_url https://access.redhat.com/security/cve/CVE-2022-3437
reference_id CVE-2022-3437
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/
url https://access.redhat.com/security/cve/CVE-2022-3437
19
reference_url https://www.samba.org/samba/security/CVE-2022-3437.html
reference_id CVE-2022-3437.html
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/
url https://www.samba.org/samba/security/CVE-2022-3437.html
20
reference_url https://security.gentoo.org/glsa/202309-06
reference_id GLSA-202309-06
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/
url https://security.gentoo.org/glsa/202309-06
21
reference_url https://security.gentoo.org/glsa/202310-06
reference_id GLSA-202310-06
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/
url https://security.gentoo.org/glsa/202310-06
22
reference_url https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html
reference_id msg00015.html
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/
url https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html
23
reference_url https://security.netapp.com/advisory/ntap-20230216-0008/
reference_id ntap-20230216-0008
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/
url https://security.netapp.com/advisory/ntap-20230216-0008/
24
reference_url https://usn.ubuntu.com/5800-1/
reference_id USN-5800-1
reference_type
scores
url https://usn.ubuntu.com/5800-1/
25
reference_url https://usn.ubuntu.com/5822-1/
reference_id USN-5822-1
reference_type
scores
url https://usn.ubuntu.com/5822-1/
26
reference_url https://usn.ubuntu.com/5936-1/
reference_id USN-5936-1
reference_type
scores
url https://usn.ubuntu.com/5936-1/
27
reference_url https://usn.ubuntu.com/7582-1/
reference_id USN-7582-1
reference_type
scores
url https://usn.ubuntu.com/7582-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.16.6%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.16.6%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.16.6%252Bdfsg-1%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2022-3437
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s2ne-rcp3-nbgz
153
url VCID-s6ma-9h2y-hyc4
vulnerability_id VCID-s6ma-9h2y-hyc4
summary samba: smb client vulnerable to filenames containing path separators
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10218.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10218.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-10218
reference_id
reference_type
scores
0
value 0.04508
scoring_system epss
scoring_elements 0.89084
published_at 2026-04-01T12:55:00Z
1
value 0.04508
scoring_system epss
scoring_elements 0.89148
published_at 2026-04-21T12:55:00Z
2
value 0.04508
scoring_system epss
scoring_elements 0.89133
published_at 2026-04-09T12:55:00Z
3
value 0.04508
scoring_system epss
scoring_elements 0.89144
published_at 2026-04-11T12:55:00Z
4
value 0.04508
scoring_system epss
scoring_elements 0.8914
published_at 2026-04-12T12:55:00Z
5
value 0.04508
scoring_system epss
scoring_elements 0.89138
published_at 2026-04-13T12:55:00Z
6
value 0.04508
scoring_system epss
scoring_elements 0.89151
published_at 2026-04-18T12:55:00Z
7
value 0.04508
scoring_system epss
scoring_elements 0.89093
published_at 2026-04-02T12:55:00Z
8
value 0.04508
scoring_system epss
scoring_elements 0.89107
published_at 2026-04-04T12:55:00Z
9
value 0.04508
scoring_system epss
scoring_elements 0.8911
published_at 2026-04-07T12:55:00Z
10
value 0.04508
scoring_system epss
scoring_elements 0.89128
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-10218
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10218
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10218
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10218
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html
7
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKPYHDFI7HRELVXBE5J4MTGSI35AKFBI/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKPYHDFI7HRELVXBE5J4MTGSI35AKFBI/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UMIYCYXCPRTVCVZ3TP6ZGPJ6RZS3IX4G/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UMIYCYXCPRTVCVZ3TP6ZGPJ6RZS3IX4G/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3IUACPZJXSC4OM6P2V4IC4QMZQZWPD/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3IUACPZJXSC4OM6P2V4IC4QMZQZWPD/
11
reference_url https://www.samba.org/samba/security/CVE-2019-10218.html
reference_id
reference_type
scores
url https://www.samba.org/samba/security/CVE-2019-10218.html
12
reference_url https://www.synology.com/security/advisory/Synology_SA_19_35
reference_id
reference_type
scores
url https://www.synology.com/security/advisory/Synology_SA_19_35
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1763137
reference_id 1763137
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1763137
14
reference_url https://security.archlinux.org/ASA-201911-6
reference_id ASA-201911-6
reference_type
scores
url https://security.archlinux.org/ASA-201911-6
15
reference_url https://security.archlinux.org/AVG-1057
reference_id AVG-1057
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1057
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-10218
reference_id CVE-2019-10218
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
2
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-10218
20
reference_url https://access.redhat.com/errata/RHSA-2020:0943
reference_id RHSA-2020:0943
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0943
21
reference_url https://access.redhat.com/errata/RHSA-2020:1084
reference_id RHSA-2020:1084
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1084
22
reference_url https://access.redhat.com/errata/RHSA-2020:1878
reference_id RHSA-2020:1878
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1878
23
reference_url https://usn.ubuntu.com/4167-1/
reference_id USN-4167-1
reference_type
scores
url https://usn.ubuntu.com/4167-1/
24
reference_url https://usn.ubuntu.com/4167-2/
reference_id USN-4167-2
reference_type
scores
url https://usn.ubuntu.com/4167-2/
fixed_packages
0
url pkg:deb/debian/samba@2:4.11.1%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.11.1%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.11.1%252Bdfsg-2%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2019-10218
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s6ma-9h2y-hyc4
154
url VCID-s7ed-4fw1-fqaz
vulnerability_id VCID-s7ed-4fw1-fqaz
summary Samba: Share restriction bypass via home-less directory user account(s)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2813.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2813.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-2813
reference_id
reference_type
scores
0
value 0.00847
scoring_system epss
scoring_elements 0.74793
published_at 2026-04-01T12:55:00Z
1
value 0.00847
scoring_system epss
scoring_elements 0.74795
published_at 2026-04-02T12:55:00Z
2
value 0.00847
scoring_system epss
scoring_elements 0.74823
published_at 2026-04-04T12:55:00Z
3
value 0.00847
scoring_system epss
scoring_elements 0.74796
published_at 2026-04-07T12:55:00Z
4
value 0.00847
scoring_system epss
scoring_elements 0.74829
published_at 2026-04-08T12:55:00Z
5
value 0.00847
scoring_system epss
scoring_elements 0.74843
published_at 2026-04-09T12:55:00Z
6
value 0.00847
scoring_system epss
scoring_elements 0.74867
published_at 2026-04-11T12:55:00Z
7
value 0.00847
scoring_system epss
scoring_elements 0.74846
published_at 2026-04-12T12:55:00Z
8
value 0.00847
scoring_system epss
scoring_elements 0.74837
published_at 2026-04-13T12:55:00Z
9
value 0.00847
scoring_system epss
scoring_elements 0.74872
published_at 2026-04-16T12:55:00Z
10
value 0.00847
scoring_system epss
scoring_elements 0.7488
published_at 2026-04-18T12:55:00Z
11
value 0.00847
scoring_system epss
scoring_elements 0.74871
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-2813
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2813
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=523752
reference_id 523752
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=523752
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=550422
reference_id 550422
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=550422
5
reference_url https://access.redhat.com/errata/RHSA-2009:1529
reference_id RHSA-2009:1529
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1529
6
reference_url https://access.redhat.com/errata/RHSA-2009:1585
reference_id RHSA-2009:1585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1585
7
reference_url https://usn.ubuntu.com/839-1/
reference_id USN-839-1
reference_type
scores
url https://usn.ubuntu.com/839-1/
fixed_packages
0
url pkg:deb/debian/samba@2:3.4.2-1?distro=trixie
purl pkg:deb/debian/samba@2:3.4.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:3.4.2-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2009-2813
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s7ed-4fw1-fqaz
155
url VCID-s8z4-1rem-y7c3
vulnerability_id VCID-s8z4-1rem-y7c3
summary
A missing boundary check in Samba might lead to the disclosure of memory
    contents.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html
1
reference_url http://marc.info/?l=bugtraq&m=125003356619515&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=125003356619515&w=2
2
reference_url http://osvdb.org/50230
reference_id
reference_type
scores
url http://osvdb.org/50230
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4314.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4314.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-4314
reference_id
reference_type
scores
0
value 0.1272
scoring_system epss
scoring_elements 0.94016
published_at 2026-04-21T12:55:00Z
1
value 0.1272
scoring_system epss
scoring_elements 0.93958
published_at 2026-04-01T12:55:00Z
2
value 0.1272
scoring_system epss
scoring_elements 0.93967
published_at 2026-04-02T12:55:00Z
3
value 0.1272
scoring_system epss
scoring_elements 0.93976
published_at 2026-04-04T12:55:00Z
4
value 0.1272
scoring_system epss
scoring_elements 0.93979
published_at 2026-04-07T12:55:00Z
5
value 0.1272
scoring_system epss
scoring_elements 0.93987
published_at 2026-04-08T12:55:00Z
6
value 0.1272
scoring_system epss
scoring_elements 0.93991
published_at 2026-04-09T12:55:00Z
7
value 0.1272
scoring_system epss
scoring_elements 0.93995
published_at 2026-04-13T12:55:00Z
8
value 0.1272
scoring_system epss
scoring_elements 0.9401
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-4314
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4314
6
reference_url http://secunia.com/advisories/32813
reference_id
reference_type
scores
url http://secunia.com/advisories/32813
7
reference_url http://secunia.com/advisories/32919
reference_id
reference_type
scores
url http://secunia.com/advisories/32919
8
reference_url http://secunia.com/advisories/32951
reference_id
reference_type
scores
url http://secunia.com/advisories/32951
9
reference_url http://secunia.com/advisories/32968
reference_id
reference_type
scores
url http://secunia.com/advisories/32968
10
reference_url http://secunia.com/advisories/36281
reference_id
reference_type
scores
url http://secunia.com/advisories/36281
11
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.453684
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.453684
12
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-249087-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-249087-1
13
reference_url http://us1.samba.org/samba/ftp/patches/security/samba-3.0.32-CVE-2008-4314.patch
reference_id
reference_type
scores
url http://us1.samba.org/samba/ftp/patches/security/samba-3.0.32-CVE-2008-4314.patch
14
reference_url http://us1.samba.org/samba/security/CVE-2008-4314.html
reference_id
reference_type
scores
url http://us1.samba.org/samba/security/CVE-2008-4314.html
15
reference_url http://www.redhat.com/archives/fedora-package-announce/2008-December/msg00021.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-package-announce/2008-December/msg00021.html
16
reference_url http://www.redhat.com/archives/fedora-package-announce/2008-December/msg00141.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-package-announce/2008-December/msg00141.html
17
reference_url http://www.securityfocus.com/bid/32494
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32494
18
reference_url http://www.securitytracker.com/id?1021287
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021287
19
reference_url http://www.ubuntu.com/usn/USN-680-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-680-1
20
reference_url http://www.vupen.com/english/advisories/2008/3277
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/3277
21
reference_url http://www.vupen.com/english/advisories/2009/0067
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0067
22
reference_url http://www.vupen.com/english/advisories/2009/2245
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/2245
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=472298
reference_id 472298
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=472298
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-4314
reference_id CVE-2008-4314
reference_type
scores
0
value 8.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-4314
35
reference_url https://security.gentoo.org/glsa/200903-07
reference_id GLSA-200903-07
reference_type
scores
url https://security.gentoo.org/glsa/200903-07
36
reference_url https://usn.ubuntu.com/680-1/
reference_id USN-680-1
reference_type
scores
url https://usn.ubuntu.com/680-1/
fixed_packages
0
url pkg:deb/debian/samba@2:3.2.5-1?distro=trixie
purl pkg:deb/debian/samba@2:3.2.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:3.2.5-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2008-4314
risk_score 3.9
exploitability 0.5
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s8z4-1rem-y7c3
156
url VCID-sd1b-cmgu-23h3
vulnerability_id VCID-sd1b-cmgu-23h3
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10919.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10919.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-10919
reference_id
reference_type
scores
0
value 0.01182
scoring_system epss
scoring_elements 0.7876
published_at 2026-04-13T12:55:00Z
1
value 0.01182
scoring_system epss
scoring_elements 0.78786
published_at 2026-04-11T12:55:00Z
2
value 0.01182
scoring_system epss
scoring_elements 0.78769
published_at 2026-04-12T12:55:00Z
3
value 0.01373
scoring_system epss
scoring_elements 0.80233
published_at 2026-04-09T12:55:00Z
4
value 0.01373
scoring_system epss
scoring_elements 0.80265
published_at 2026-04-21T12:55:00Z
5
value 0.01373
scoring_system epss
scoring_elements 0.80206
published_at 2026-04-04T12:55:00Z
6
value 0.01373
scoring_system epss
scoring_elements 0.80195
published_at 2026-04-07T12:55:00Z
7
value 0.01373
scoring_system epss
scoring_elements 0.80223
published_at 2026-04-08T12:55:00Z
8
value 0.01373
scoring_system epss
scoring_elements 0.80261
published_at 2026-04-16T12:55:00Z
9
value 0.01373
scoring_system epss
scoring_elements 0.80262
published_at 2026-04-18T12:55:00Z
10
value 0.01785
scoring_system epss
scoring_elements 0.8268
published_at 2026-04-02T12:55:00Z
11
value 0.01785
scoring_system epss
scoring_elements 0.82664
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-10919
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10858
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10919
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1610645
reference_id 1610645
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1610645
5
reference_url https://security.gentoo.org/glsa/202003-52
reference_id GLSA-202003-52
reference_type
scores
url https://security.gentoo.org/glsa/202003-52
6
reference_url https://usn.ubuntu.com/3738-1/
reference_id USN-3738-1
reference_type
scores
url https://usn.ubuntu.com/3738-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.8.4%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.8.4%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.8.4%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2018-10919
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sd1b-cmgu-23h3
157
url VCID-sgp8-b3jx-cbh5
vulnerability_id VCID-sgp8-b3jx-cbh5
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which may allow execution of arbitrary code with root privileges.
references
0
reference_url http://badlock.org/
reference_id
reference_type
scores
url http://badlock.org/
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html
10
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html
11
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html
12
reference_url http://rhn.redhat.com/errata/RHSA-2016-0611.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0611.html
13
reference_url http://rhn.redhat.com/errata/RHSA-2016-0612.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0612.html
14
reference_url http://rhn.redhat.com/errata/RHSA-2016-0613.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0613.html
15
reference_url http://rhn.redhat.com/errata/RHSA-2016-0614.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0614.html
16
reference_url http://rhn.redhat.com/errata/RHSA-2016-0618.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0618.html
17
reference_url http://rhn.redhat.com/errata/RHSA-2016-0619.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0619.html
18
reference_url http://rhn.redhat.com/errata/RHSA-2016-0620.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0620.html
19
reference_url http://rhn.redhat.com/errata/RHSA-2016-0624.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0624.html
20
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2115.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2115.json
21
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2115
reference_id
reference_type
scores
0
value 0.25196
scoring_system epss
scoring_elements 0.962
published_at 2026-04-21T12:55:00Z
1
value 0.25196
scoring_system epss
scoring_elements 0.96196
published_at 2026-04-16T12:55:00Z
2
value 0.25196
scoring_system epss
scoring_elements 0.96201
published_at 2026-04-18T12:55:00Z
3
value 0.25196
scoring_system epss
scoring_elements 0.96149
published_at 2026-04-01T12:55:00Z
4
value 0.25196
scoring_system epss
scoring_elements 0.96157
published_at 2026-04-02T12:55:00Z
5
value 0.25196
scoring_system epss
scoring_elements 0.96164
published_at 2026-04-04T12:55:00Z
6
value 0.25196
scoring_system epss
scoring_elements 0.96167
published_at 2026-04-07T12:55:00Z
7
value 0.25196
scoring_system epss
scoring_elements 0.96177
published_at 2026-04-08T12:55:00Z
8
value 0.25196
scoring_system epss
scoring_elements 0.96181
published_at 2026-04-09T12:55:00Z
9
value 0.25196
scoring_system epss
scoring_elements 0.96185
published_at 2026-04-11T12:55:00Z
10
value 0.25196
scoring_system epss
scoring_elements 0.96184
published_at 2026-04-12T12:55:00Z
11
value 0.25196
scoring_system epss
scoring_elements 0.96187
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2115
22
reference_url https://bto.bluecoat.com/security-advisory/sa122
reference_id
reference_type
scores
url https://bto.bluecoat.com/security-advisory/sa122
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2114
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2114
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118
31
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
32
reference_url https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05087821
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05087821
33
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05082964
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05082964
34
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399
35
reference_url https://www.samba.org/samba/history/samba-4.2.10.html
reference_id
reference_type
scores
url https://www.samba.org/samba/history/samba-4.2.10.html
36
reference_url https://www.samba.org/samba/latest_news.html#4.4.2
reference_id
reference_type
scores
url https://www.samba.org/samba/latest_news.html#4.4.2
37
reference_url https://www.samba.org/samba/security/CVE-2016-2115.html
reference_id
reference_type
scores
url https://www.samba.org/samba/security/CVE-2016-2115.html
38
reference_url http://www.debian.org/security/2016/dsa-3548
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3548
39
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
40
reference_url http://www.securitytracker.com/id/1035533
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035533
41
reference_url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.458012
reference_id
reference_type
scores
url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.458012
42
reference_url http://www.ubuntu.com/usn/USN-2950-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2950-1
43
reference_url http://www.ubuntu.com/usn/USN-2950-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2950-2
44
reference_url http://www.ubuntu.com/usn/USN-2950-3
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2950-3
45
reference_url http://www.ubuntu.com/usn/USN-2950-4
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2950-4
46
reference_url http://www.ubuntu.com/usn/USN-2950-5
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2950-5
47
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1312084
reference_id 1312084
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1312084
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*
138
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*
139
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*
140
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*
141
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*
142
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*
143
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*
144
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:*
145
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:*
146
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:*
147
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.15:*:*:*:*:*:*:*
148
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.16:*:*:*:*:*:*:*
149
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*
150
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*
151
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*
152
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*
153
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*
154
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*
155
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*
156
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*
157
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*
158
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*
159
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*
160
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*
161
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.12:*:*:*:*:*:*:*
162
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.13:*:*:*:*:*:*:*
163
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.14:*:*:*:*:*:*:*
164
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.15:*:*:*:*:*:*:*
165
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.16:*:*:*:*:*:*:*
166
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.17:*:*:*:*:*:*:*
167
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*
168
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*
169
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*
170
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*
171
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*
172
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*
173
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*
174
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*
175
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*
176
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*
177
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*
178
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*
179
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*
180
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*
181
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.14:*:*:*:*:*:*:*
182
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.15:*:*:*:*:*:*:*
183
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.16:*:*:*:*:*:*:*
184
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.17:*:*:*:*:*:*:*
185
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.18:*:*:*:*:*:*:*
186
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.19:*:*:*:*:*:*:*
187
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*
188
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.20:*:*:*:*:*:*:*
189
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.21:*:*:*:*:*:*:*
190
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.22:*:*:*:*:*:*:*
191
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*
192
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*
193
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*
194
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*
195
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*
196
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*
197
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*
198
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*
199
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*
200
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*
201
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*
202
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*
203
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*
204
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*
205
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*
206
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*
207
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*
208
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*
209
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*
210
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*
211
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*
212
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*
213
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*
214
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*
215
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.24:*:*:*:*:*:*:*
216
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.25:*:*:*:*:*:*:*
217
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*
218
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*
219
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*
220
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*
221
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*
222
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*
223
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*
224
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
225
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*
226
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*
227
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*
228
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*
229
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*
230
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*
231
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*
232
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*
233
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*
234
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*
235
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*
236
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*
237
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*
238
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*
239
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*
240
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*
241
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*
242
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.25:*:*:*:*:*:*:*
243
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.26:*:*:*:*:*:*:*
244
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*
245
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*
246
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*
247
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*
248
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*
249
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*
250
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*
251
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*
252
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*
253
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*
254
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*
255
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*
256
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*
257
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*
258
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*
259
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*
260
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*
261
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*
262
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*
263
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*
264
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*
265
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*
266
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*
267
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.23:*:*:*:*:*:*:*
268
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*
269
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*
270
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*
271
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*
272
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*
273
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*
274
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*
275
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*
276
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*
277
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*
278
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*
279
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*
280
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*
281
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*
282
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*
283
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*
284
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*
285
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*
286
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*
287
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.9:*:*:*:*:*:*:*
288
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*
289
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*
290
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*
291
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*
292
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*
293
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*
294
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.6:*:*:*:*:*:*:*
295
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:*:*:*:*:*:*:*
296
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
297
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
298
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
299
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-2115
reference_id CVE-2016-2115
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-2115
300
reference_url https://security.gentoo.org/glsa/201612-47
reference_id GLSA-201612-47
reference_type
scores
url https://security.gentoo.org/glsa/201612-47
301
reference_url https://access.redhat.com/errata/RHSA-2016:0611
reference_id RHSA-2016:0611
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0611
302
reference_url https://access.redhat.com/errata/RHSA-2016:0612
reference_id RHSA-2016:0612
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0612
303
reference_url https://access.redhat.com/errata/RHSA-2016:0613
reference_id RHSA-2016:0613
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0613
304
reference_url https://access.redhat.com/errata/RHSA-2016:0614
reference_id RHSA-2016:0614
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0614
305
reference_url https://access.redhat.com/errata/RHSA-2016:0618
reference_id RHSA-2016:0618
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0618
306
reference_url https://access.redhat.com/errata/RHSA-2016:0619
reference_id RHSA-2016:0619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0619
307
reference_url https://access.redhat.com/errata/RHSA-2016:0620
reference_id RHSA-2016:0620
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0620
308
reference_url https://access.redhat.com/errata/RHSA-2016:0624
reference_id RHSA-2016:0624
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0624
309
reference_url https://usn.ubuntu.com/2950-1/
reference_id USN-2950-1
reference_type
scores
url https://usn.ubuntu.com/2950-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.3.7%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.3.7%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.3.7%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2016-2115
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sgp8-b3jx-cbh5
158
url VCID-smxs-4de1-nfec
vulnerability_id VCID-smxs-4de1-nfec
summary Multiple vulnerabilities have been discovered in Samba, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4091.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4091.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4091
reference_id
reference_type
scores
0
value 0.00438
scoring_system epss
scoring_elements 0.63147
published_at 2026-04-21T12:55:00Z
1
value 0.00476
scoring_system epss
scoring_elements 0.6484
published_at 2026-04-07T12:55:00Z
2
value 0.00476
scoring_system epss
scoring_elements 0.6489
published_at 2026-04-08T12:55:00Z
3
value 0.00476
scoring_system epss
scoring_elements 0.64905
published_at 2026-04-09T12:55:00Z
4
value 0.00476
scoring_system epss
scoring_elements 0.64922
published_at 2026-04-11T12:55:00Z
5
value 0.00476
scoring_system epss
scoring_elements 0.64912
published_at 2026-04-12T12:55:00Z
6
value 0.00476
scoring_system epss
scoring_elements 0.64884
published_at 2026-04-13T12:55:00Z
7
value 0.00476
scoring_system epss
scoring_elements 0.64921
published_at 2026-04-16T12:55:00Z
8
value 0.00476
scoring_system epss
scoring_elements 0.64931
published_at 2026-04-18T12:55:00Z
9
value 0.00476
scoring_system epss
scoring_elements 0.64877
published_at 2026-04-04T12:55:00Z
10
value 0.00476
scoring_system epss
scoring_elements 0.6485
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4091
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2241882
reference_id 2241882
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T16:18:12Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2241882
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::resilientstorage
reference_id cpe:/a:redhat:enterprise_linux:9::resilientstorage
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::resilientstorage
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb
reference_id cpe:/a:redhat:rhel_eus:8.6::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb
reference_id cpe:/a:redhat:rhel_eus:8.8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
reference_id cpe:/a:redhat:rhel_eus:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb
reference_id cpe:/a:redhat:rhel_eus:9.0::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::resilientstorage
reference_id cpe:/a:redhat:rhel_eus:9.0::resilientstorage
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::resilientstorage
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb
reference_id cpe:/a:redhat:rhel_eus:9.2::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::resilientstorage
reference_id cpe:/a:redhat:rhel_eus:9.2::resilientstorage
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::resilientstorage
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:storage:3
reference_id cpe:/a:redhat:storage:3
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:storage:3
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos
reference_id cpe:/o:redhat:rhel_eus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.0::baseos
reference_id cpe:/o:redhat:rhel_eus:9.0::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.0::baseos
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
reference_id cpe:/o:redhat:rhel_eus:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8
reference_id cpe:/o:redhat:rhev_hypervisor:4.4::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8
35
reference_url https://access.redhat.com/security/cve/CVE-2023-4091
reference_id CVE-2023-4091
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T16:18:12Z/
url https://access.redhat.com/security/cve/CVE-2023-4091
36
reference_url https://www.samba.org/samba/security/CVE-2023-4091.html
reference_id CVE-2023-4091.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T16:18:12Z/
url https://www.samba.org/samba/security/CVE-2023-4091.html
37
reference_url https://security.gentoo.org/glsa/202402-28
reference_id GLSA-202402-28
reference_type
scores
url https://security.gentoo.org/glsa/202402-28
38
reference_url https://access.redhat.com/errata/RHSA-2023:6209
reference_id RHSA-2023:6209
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T16:18:12Z/
url https://access.redhat.com/errata/RHSA-2023:6209
39
reference_url https://access.redhat.com/errata/RHSA-2023:6744
reference_id RHSA-2023:6744
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T16:18:12Z/
url https://access.redhat.com/errata/RHSA-2023:6744
40
reference_url https://access.redhat.com/errata/RHSA-2023:7371
reference_id RHSA-2023:7371
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T16:18:12Z/
url https://access.redhat.com/errata/RHSA-2023:7371
41
reference_url https://access.redhat.com/errata/RHSA-2023:7408
reference_id RHSA-2023:7408
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T16:18:12Z/
url https://access.redhat.com/errata/RHSA-2023:7408
42
reference_url https://access.redhat.com/errata/RHSA-2023:7464
reference_id RHSA-2023:7464
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T16:18:12Z/
url https://access.redhat.com/errata/RHSA-2023:7464
43
reference_url https://access.redhat.com/errata/RHSA-2023:7467
reference_id RHSA-2023:7467
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T16:18:12Z/
url https://access.redhat.com/errata/RHSA-2023:7467
44
reference_url https://bugzilla.samba.org/show_bug.cgi?id=15439
reference_id show_bug.cgi?id=15439
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T16:18:12Z/
url https://bugzilla.samba.org/show_bug.cgi?id=15439
45
reference_url https://usn.ubuntu.com/6425-1/
reference_id USN-6425-1
reference_type
scores
url https://usn.ubuntu.com/6425-1/
46
reference_url https://usn.ubuntu.com/6425-3/
reference_id USN-6425-3
reference_type
scores
url https://usn.ubuntu.com/6425-3/
fixed_packages
0
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u1%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.19.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.19.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.19.1%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
6
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2023-4091
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-smxs-4de1-nfec
159
url VCID-suj6-3muw-rfdx
vulnerability_id VCID-suj6-3muw-rfdx
summary security flaw
references
0
reference_url ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.17/SCOSA-2005.17.txt
reference_id
reference_type
scores
url ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.17/SCOSA-2005.17.txt
1
reference_url http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-1154.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-1154.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-1154
reference_id
reference_type
scores
0
value 0.27766
scoring_system epss
scoring_elements 0.96466
published_at 2026-04-21T12:55:00Z
1
value 0.27766
scoring_system epss
scoring_elements 0.96419
published_at 2026-04-01T12:55:00Z
2
value 0.27766
scoring_system epss
scoring_elements 0.96426
published_at 2026-04-02T12:55:00Z
3
value 0.27766
scoring_system epss
scoring_elements 0.9643
published_at 2026-04-04T12:55:00Z
4
value 0.27766
scoring_system epss
scoring_elements 0.96433
published_at 2026-04-07T12:55:00Z
5
value 0.27766
scoring_system epss
scoring_elements 0.96442
published_at 2026-04-08T12:55:00Z
6
value 0.27766
scoring_system epss
scoring_elements 0.96445
published_at 2026-04-09T12:55:00Z
7
value 0.27766
scoring_system epss
scoring_elements 0.96449
published_at 2026-04-11T12:55:00Z
8
value 0.27766
scoring_system epss
scoring_elements 0.9645
published_at 2026-04-12T12:55:00Z
9
value 0.27766
scoring_system epss
scoring_elements 0.96452
published_at 2026-04-13T12:55:00Z
10
value 0.27766
scoring_system epss
scoring_elements 0.96459
published_at 2026-04-16T12:55:00Z
11
value 0.27766
scoring_system epss
scoring_elements 0.96464
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-1154
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1154
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1154
5
reference_url http://secunia.com/advisories/13453/
reference_id
reference_type
scores
url http://secunia.com/advisories/13453/
6
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/18519
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/18519
7
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10236
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10236
8
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1459
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1459
9
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A642
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A642
10
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-101643-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-101643-1
11
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-57730-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-57730-1
12
reference_url http://www.debian.org/security/2005/dsa-701
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-701
13
reference_url http://www.idefense.com/application/poi/display?id=165&type=vulnerabilities
reference_id
reference_type
scores
url http://www.idefense.com/application/poi/display?id=165&type=vulnerabilities
14
reference_url http://www.kb.cert.org/vuls/id/226184
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/226184
15
reference_url http://www.novell.com/linux/security/advisories/2004_45_samba.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2004_45_samba.html
16
reference_url http://www.redhat.com/support/errata/RHSA-2005-020.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-020.html
17
reference_url http://www.samba.org/samba/security/CAN-2004-1154.html
reference_id
reference_type
scores
url http://www.samba.org/samba/security/CAN-2004-1154.html
18
reference_url http://www.securityfocus.com/bid/11973
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/11973
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617382
reference_id 1617382
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617382
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:2.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.0.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.0.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:2.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.0.10:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.0.2:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.0.3:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.0.4:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.0.5:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.0.6:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:2.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.0.7:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:2.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.0.8:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:2.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.0.9:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:2.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.2.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.2.0a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:2.2.0a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.2.0a:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:2.2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.2.11:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:2.2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.2.12:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.2.1a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:2.2.1a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.2.1a:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.2.2:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:2.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.2.3:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.2.3a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:2.2.3a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.2.3a:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:2.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.2.4:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:2.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.2.5:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:2.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.2.6:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:2.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.2.7:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.2.7a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:2.2.7a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.2.7a:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:2.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.2.8:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.2.8a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:2.2.8a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.2.8a:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:2.2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.2.9:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.2a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:2.2a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:2.2a:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:1.0:*:desktop:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:1.0:*:desktop:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:1.0:*:desktop:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/detail/CVE-2004-1154
reference_id CVE-2004-1154
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2004-1154
74
reference_url https://access.redhat.com/errata/RHSA-2004:670
reference_id RHSA-2004:670
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:670
75
reference_url https://access.redhat.com/errata/RHSA-2004:681
reference_id RHSA-2004:681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:681
76
reference_url https://access.redhat.com/errata/RHSA-2005:020
reference_id RHSA-2005:020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:020
77
reference_url https://usn.ubuntu.com/41-1/
reference_id USN-41-1
reference_type
scores
url https://usn.ubuntu.com/41-1/
fixed_packages
0
url pkg:deb/debian/samba@3.0.10-1?distro=trixie
purl pkg:deb/debian/samba@3.0.10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@3.0.10-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2004-1154
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-suj6-3muw-rfdx
160
url VCID-sxfu-9fce-zfer
vulnerability_id VCID-sxfu-9fce-zfer
summary
Samba contains two buffer overflow vulnerabilities potentially resulting in
    the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4572.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4572.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4572
reference_id
reference_type
scores
0
value 0.21484
scoring_system epss
scoring_elements 0.95678
published_at 2026-04-01T12:55:00Z
1
value 0.21484
scoring_system epss
scoring_elements 0.95687
published_at 2026-04-02T12:55:00Z
2
value 0.21484
scoring_system epss
scoring_elements 0.95693
published_at 2026-04-04T12:55:00Z
3
value 0.21484
scoring_system epss
scoring_elements 0.95696
published_at 2026-04-07T12:55:00Z
4
value 0.21484
scoring_system epss
scoring_elements 0.95704
published_at 2026-04-08T12:55:00Z
5
value 0.21484
scoring_system epss
scoring_elements 0.95708
published_at 2026-04-09T12:55:00Z
6
value 0.21484
scoring_system epss
scoring_elements 0.95711
published_at 2026-04-12T12:55:00Z
7
value 0.21484
scoring_system epss
scoring_elements 0.95713
published_at 2026-04-13T12:55:00Z
8
value 0.21484
scoring_system epss
scoring_elements 0.95722
published_at 2026-04-16T12:55:00Z
9
value 0.21484
scoring_system epss
scoring_elements 0.95725
published_at 2026-04-18T12:55:00Z
10
value 0.21484
scoring_system epss
scoring_elements 0.95726
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4572
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4572
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4572
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=294631
reference_id 294631
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=294631
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=451385
reference_id 451385
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=451385
5
reference_url https://security.gentoo.org/glsa/200711-29
reference_id GLSA-200711-29
reference_type
scores
url https://security.gentoo.org/glsa/200711-29
6
reference_url https://access.redhat.com/errata/RHSA-2007:1013
reference_id RHSA-2007:1013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1013
7
reference_url https://access.redhat.com/errata/RHSA-2007:1016
reference_id RHSA-2007:1016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1016
8
reference_url https://access.redhat.com/errata/RHSA-2007:1017
reference_id RHSA-2007:1017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1017
9
reference_url https://usn.ubuntu.com/544-1/
reference_id USN-544-1
reference_type
scores
url https://usn.ubuntu.com/544-1/
10
reference_url https://usn.ubuntu.com/544-2/
reference_id USN-544-2
reference_type
scores
url https://usn.ubuntu.com/544-2/
11
reference_url https://usn.ubuntu.com/617-1/
reference_id USN-617-1
reference_type
scores
url https://usn.ubuntu.com/617-1/
fixed_packages
0
url pkg:deb/debian/samba@3.0.27-1?distro=trixie
purl pkg:deb/debian/samba@3.0.27-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@3.0.27-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2007-4572
risk_score 0.1
exploitability 0.5
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sxfu-9fce-zfer
161
url VCID-t3zy-v34p-7uen
vulnerability_id VCID-t3zy-v34p-7uen
summary Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32746.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32746.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32746
reference_id
reference_type
scores
0
value 0.00302
scoring_system epss
scoring_elements 0.53475
published_at 2026-04-02T12:55:00Z
1
value 0.00338
scoring_system epss
scoring_elements 0.56659
published_at 2026-04-21T12:55:00Z
2
value 0.00338
scoring_system epss
scoring_elements 0.56688
published_at 2026-04-16T12:55:00Z
3
value 0.00338
scoring_system epss
scoring_elements 0.56687
published_at 2026-04-18T12:55:00Z
4
value 0.00338
scoring_system epss
scoring_elements 0.5666
published_at 2026-04-04T12:55:00Z
5
value 0.00338
scoring_system epss
scoring_elements 0.56638
published_at 2026-04-07T12:55:00Z
6
value 0.00338
scoring_system epss
scoring_elements 0.5669
published_at 2026-04-08T12:55:00Z
7
value 0.00338
scoring_system epss
scoring_elements 0.56694
published_at 2026-04-09T12:55:00Z
8
value 0.00338
scoring_system epss
scoring_elements 0.56703
published_at 2026-04-11T12:55:00Z
9
value 0.00338
scoring_system epss
scoring_elements 0.56678
published_at 2026-04-12T12:55:00Z
10
value 0.00338
scoring_system epss
scoring_elements 0.56657
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32746
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449
reference_id 1016449
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2108215
reference_id 2108215
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2108215
10
reference_url https://security.archlinux.org/AVG-2782
reference_id AVG-2782
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2782
11
reference_url https://security.gentoo.org/glsa/202309-06
reference_id GLSA-202309-06
reference_type
scores
url https://security.gentoo.org/glsa/202309-06
12
reference_url https://access.redhat.com/errata/RHSA-2022:7730
reference_id RHSA-2022:7730
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7730
13
reference_url https://access.redhat.com/errata/RHSA-2022:8318
reference_id RHSA-2022:8318
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8318
14
reference_url https://usn.ubuntu.com/5542-1/
reference_id USN-5542-1
reference_type
scores
url https://usn.ubuntu.com/5542-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u5?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u5%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.16.4%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.16.4%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.16.4%252Bdfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
6
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2022-32746
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t3zy-v34p-7uen
162
url VCID-tcbv-cguk-hfg2
vulnerability_id VCID-tcbv-cguk-hfg2
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11103.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11103.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-11103
reference_id
reference_type
scores
0
value 0.06302
scoring_system epss
scoring_elements 0.90907
published_at 2026-04-01T12:55:00Z
1
value 0.06302
scoring_system epss
scoring_elements 0.90912
published_at 2026-04-02T12:55:00Z
2
value 0.06302
scoring_system epss
scoring_elements 0.90922
published_at 2026-04-04T12:55:00Z
3
value 0.06302
scoring_system epss
scoring_elements 0.90932
published_at 2026-04-07T12:55:00Z
4
value 0.06302
scoring_system epss
scoring_elements 0.90943
published_at 2026-04-08T12:55:00Z
5
value 0.06302
scoring_system epss
scoring_elements 0.9095
published_at 2026-04-09T12:55:00Z
6
value 0.06302
scoring_system epss
scoring_elements 0.90958
published_at 2026-04-13T12:55:00Z
7
value 0.06302
scoring_system epss
scoring_elements 0.90959
published_at 2026-04-12T12:55:00Z
8
value 0.06302
scoring_system epss
scoring_elements 0.90983
published_at 2026-04-16T12:55:00Z
9
value 0.06302
scoring_system epss
scoring_elements 0.90981
published_at 2026-04-18T12:55:00Z
10
value 0.06302
scoring_system epss
scoring_elements 0.90982
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-11103
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11103
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11103
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1469976
reference_id 1469976
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1469976
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=868208
reference_id 868208
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=868208
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=868209
reference_id 868209
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=868209
6
reference_url https://usn.ubuntu.com/3353-1/
reference_id USN-3353-1
reference_type
scores
url https://usn.ubuntu.com/3353-1/
7
reference_url https://usn.ubuntu.com/3353-2/
reference_id USN-3353-2
reference_type
scores
url https://usn.ubuntu.com/3353-2/
8
reference_url https://usn.ubuntu.com/3353-3/
reference_id USN-3353-3
reference_type
scores
url https://usn.ubuntu.com/3353-3/
9
reference_url https://usn.ubuntu.com/3353-4/
reference_id USN-3353-4
reference_type
scores
url https://usn.ubuntu.com/3353-4/
fixed_packages
0
url pkg:deb/debian/samba@2:4.6.5%2Bdfsg-4?distro=trixie
purl pkg:deb/debian/samba@2:4.6.5%2Bdfsg-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.6.5%252Bdfsg-4%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2017-11103
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tcbv-cguk-hfg2
163
url VCID-tk1x-bex4-8kbz
vulnerability_id VCID-tk1x-bex4-8kbz
summary Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3738.json
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3738.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3738
reference_id
reference_type
scores
0
value 0.00401
scoring_system epss
scoring_elements 0.60809
published_at 2026-04-21T12:55:00Z
1
value 0.00401
scoring_system epss
scoring_elements 0.60825
published_at 2026-04-18T12:55:00Z
2
value 0.00402
scoring_system epss
scoring_elements 0.60711
published_at 2026-04-01T12:55:00Z
3
value 0.00402
scoring_system epss
scoring_elements 0.60784
published_at 2026-04-02T12:55:00Z
4
value 0.00402
scoring_system epss
scoring_elements 0.60813
published_at 2026-04-04T12:55:00Z
5
value 0.00402
scoring_system epss
scoring_elements 0.60777
published_at 2026-04-07T12:55:00Z
6
value 0.00402
scoring_system epss
scoring_elements 0.60826
published_at 2026-04-08T12:55:00Z
7
value 0.00402
scoring_system epss
scoring_elements 0.60842
published_at 2026-04-09T12:55:00Z
8
value 0.00402
scoring_system epss
scoring_elements 0.60863
published_at 2026-04-11T12:55:00Z
9
value 0.00402
scoring_system epss
scoring_elements 0.6085
published_at 2026-04-12T12:55:00Z
10
value 0.00402
scoring_system epss
scoring_elements 0.60831
published_at 2026-04-13T12:55:00Z
11
value 0.00402
scoring_system epss
scoring_elements 0.60873
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3738
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2021726
reference_id 2021726
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2021726
12
reference_url https://security.archlinux.org/AVG-2538
reference_id AVG-2538
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2538
13
reference_url https://security.gentoo.org/glsa/202309-06
reference_id GLSA-202309-06
reference_type
scores
url https://security.gentoo.org/glsa/202309-06
14
reference_url https://usn.ubuntu.com/5142-1/
reference_id USN-5142-1
reference_type
scores
url https://usn.ubuntu.com/5142-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u2?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u2%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.13.14%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.13.14%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.14%252Bdfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
6
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2021-3738
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tk1x-bex4-8kbz
164
url VCID-tskp-1ra2-wyez
vulnerability_id VCID-tskp-1ra2-wyez
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16852.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16852.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-16852
reference_id
reference_type
scores
0
value 0.02897
scoring_system epss
scoring_elements 0.86261
published_at 2026-04-01T12:55:00Z
1
value 0.02897
scoring_system epss
scoring_elements 0.86339
published_at 2026-04-21T12:55:00Z
2
value 0.02897
scoring_system epss
scoring_elements 0.86341
published_at 2026-04-16T12:55:00Z
3
value 0.02897
scoring_system epss
scoring_elements 0.86345
published_at 2026-04-18T12:55:00Z
4
value 0.02897
scoring_system epss
scoring_elements 0.86271
published_at 2026-04-02T12:55:00Z
5
value 0.02897
scoring_system epss
scoring_elements 0.86289
published_at 2026-04-07T12:55:00Z
6
value 0.02897
scoring_system epss
scoring_elements 0.86307
published_at 2026-04-08T12:55:00Z
7
value 0.02897
scoring_system epss
scoring_elements 0.86317
published_at 2026-04-09T12:55:00Z
8
value 0.02897
scoring_system epss
scoring_elements 0.86332
published_at 2026-04-11T12:55:00Z
9
value 0.02897
scoring_system epss
scoring_elements 0.8633
published_at 2026-04-12T12:55:00Z
10
value 0.02897
scoring_system epss
scoring_elements 0.86325
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-16852
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16852
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1646386
reference_id 1646386
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1646386
5
reference_url https://security.archlinux.org/ASA-201811-22
reference_id ASA-201811-22
reference_type
scores
url https://security.archlinux.org/ASA-201811-22
6
reference_url https://security.archlinux.org/AVG-823
reference_id AVG-823
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-823
7
reference_url https://security.gentoo.org/glsa/202003-52
reference_id GLSA-202003-52
reference_type
scores
url https://security.gentoo.org/glsa/202003-52
fixed_packages
0
url pkg:deb/debian/samba@2:4.9.2%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.9.2%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.2%252Bdfsg-2%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2018-16852
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tskp-1ra2-wyez
165
url VCID-tvka-n7p1-nbec
vulnerability_id VCID-tvka-n7p1-nbec
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which allowing a context-dependent attacker to bypass intended file
    restrictions, cause a Denial of Service or execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6150.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6150.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-6150
reference_id
reference_type
scores
0
value 0.00125
scoring_system epss
scoring_elements 0.31703
published_at 2026-04-21T12:55:00Z
1
value 0.00139
scoring_system epss
scoring_elements 0.34097
published_at 2026-04-02T12:55:00Z
2
value 0.00139
scoring_system epss
scoring_elements 0.34128
published_at 2026-04-04T12:55:00Z
3
value 0.00139
scoring_system epss
scoring_elements 0.33988
published_at 2026-04-07T12:55:00Z
4
value 0.00139
scoring_system epss
scoring_elements 0.3403
published_at 2026-04-08T12:55:00Z
5
value 0.00139
scoring_system epss
scoring_elements 0.34061
published_at 2026-04-09T12:55:00Z
6
value 0.00139
scoring_system epss
scoring_elements 0.33759
published_at 2026-04-01T12:55:00Z
7
value 0.00139
scoring_system epss
scoring_elements 0.34017
published_at 2026-04-12T12:55:00Z
8
value 0.00139
scoring_system epss
scoring_elements 0.33993
published_at 2026-04-13T12:55:00Z
9
value 0.00139
scoring_system epss
scoring_elements 0.34029
published_at 2026-04-16T12:55:00Z
10
value 0.00139
scoring_system epss
scoring_elements 0.34016
published_at 2026-04-18T12:55:00Z
11
value 0.00139
scoring_system epss
scoring_elements 0.3406
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-6150
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6150
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6150
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1036897
reference_id 1036897
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1036897
4
reference_url https://security.gentoo.org/glsa/201502-15
reference_id GLSA-201502-15
reference_type
scores
url https://security.gentoo.org/glsa/201502-15
5
reference_url https://access.redhat.com/errata/RHSA-2014:0330
reference_id RHSA-2014:0330
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0330
6
reference_url https://access.redhat.com/errata/RHSA-2014:0383
reference_id RHSA-2014:0383
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0383
7
reference_url https://usn.ubuntu.com/2054-1/
reference_id USN-2054-1
reference_type
scores
url https://usn.ubuntu.com/2054-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.0.13%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.0.13%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.0.13%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-6150
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tvka-n7p1-nbec
166
url VCID-u2et-5wrc-1ubr
vulnerability_id VCID-u2et-5wrc-1ubr
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0807.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0807.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0807
reference_id
reference_type
scores
0
value 0.09849
scoring_system epss
scoring_elements 0.92953
published_at 2026-04-01T12:55:00Z
1
value 0.09849
scoring_system epss
scoring_elements 0.92962
published_at 2026-04-02T12:55:00Z
2
value 0.09849
scoring_system epss
scoring_elements 0.92967
published_at 2026-04-04T12:55:00Z
3
value 0.09849
scoring_system epss
scoring_elements 0.92966
published_at 2026-04-07T12:55:00Z
4
value 0.09849
scoring_system epss
scoring_elements 0.92974
published_at 2026-04-08T12:55:00Z
5
value 0.09849
scoring_system epss
scoring_elements 0.92979
published_at 2026-04-09T12:55:00Z
6
value 0.09849
scoring_system epss
scoring_elements 0.92983
published_at 2026-04-13T12:55:00Z
7
value 0.09849
scoring_system epss
scoring_elements 0.92981
published_at 2026-04-12T12:55:00Z
8
value 0.09849
scoring_system epss
scoring_elements 0.92993
published_at 2026-04-16T12:55:00Z
9
value 0.09849
scoring_system epss
scoring_elements 0.92995
published_at 2026-04-18T12:55:00Z
10
value 0.09849
scoring_system epss
scoring_elements 0.93002
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0807
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0807
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617297
reference_id 1617297
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617297
4
reference_url https://access.redhat.com/errata/RHSA-2004:467
reference_id RHSA-2004:467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:467
fixed_packages
0
url pkg:deb/debian/samba@3.0.7?distro=trixie
purl pkg:deb/debian/samba@3.0.7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@3.0.7%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2004-0807
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u2et-5wrc-1ubr
167
url VCID-umah-ug4p-9ydh
vulnerability_id VCID-umah-ug4p-9ydh
summary (SWAT): XSS flaw in Change Password page
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2694.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2694.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-2694
reference_id
reference_type
scores
0
value 0.03127
scoring_system epss
scoring_elements 0.86794
published_at 2026-04-01T12:55:00Z
1
value 0.03127
scoring_system epss
scoring_elements 0.86805
published_at 2026-04-02T12:55:00Z
2
value 0.03127
scoring_system epss
scoring_elements 0.86824
published_at 2026-04-04T12:55:00Z
3
value 0.03127
scoring_system epss
scoring_elements 0.86817
published_at 2026-04-07T12:55:00Z
4
value 0.03127
scoring_system epss
scoring_elements 0.86837
published_at 2026-04-08T12:55:00Z
5
value 0.03127
scoring_system epss
scoring_elements 0.86845
published_at 2026-04-09T12:55:00Z
6
value 0.03127
scoring_system epss
scoring_elements 0.86858
published_at 2026-04-11T12:55:00Z
7
value 0.03127
scoring_system epss
scoring_elements 0.86854
published_at 2026-04-12T12:55:00Z
8
value 0.03127
scoring_system epss
scoring_elements 0.86849
published_at 2026-04-13T12:55:00Z
9
value 0.03127
scoring_system epss
scoring_elements 0.86867
published_at 2026-04-16T12:55:00Z
10
value 0.03127
scoring_system epss
scoring_elements 0.86872
published_at 2026-04-18T12:55:00Z
11
value 0.03127
scoring_system epss
scoring_elements 0.86873
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-2694
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2694
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2694
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=722537
reference_id 722537
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=722537
4
reference_url https://access.redhat.com/errata/RHSA-2011:1219
reference_id RHSA-2011:1219
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1219
5
reference_url https://access.redhat.com/errata/RHSA-2011:1220
reference_id RHSA-2011:1220
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1220
6
reference_url https://access.redhat.com/errata/RHSA-2011:1221
reference_id RHSA-2011:1221
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1221
7
reference_url https://usn.ubuntu.com/1182-1/
reference_id USN-1182-1
reference_type
scores
url https://usn.ubuntu.com/1182-1/
fixed_packages
0
url pkg:deb/debian/samba@2:3.5.10~dfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:3.5.10~dfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:3.5.10~dfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2011-2694
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-umah-ug4p-9ydh
168
url VCID-ur8t-kfr3-1fgy
vulnerability_id VCID-ur8t-kfr3-1fgy
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which may allow execution of arbitrary code with root privileges.
references
0
reference_url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=873
reference_id
reference_type
scores
url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=873
1
reference_url http://lists.apple.com/archives/security-announce/2010//Aug/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Aug/msg00003.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
3
reference_url http://marc.info/?l=bugtraq&m=129138831608422&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=129138831608422&w=2
4
reference_url http://marc.info/?l=bugtraq&m=130835366526620&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=130835366526620&w=2
5
reference_url http://marc.info/?l=samba-announce&m=127668712312761&w=2
reference_id
reference_type
scores
url http://marc.info/?l=samba-announce&m=127668712312761&w=2
6
reference_url http://osvdb.org/65518
reference_id
reference_type
scores
url http://osvdb.org/65518
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2063.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2063.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2063
reference_id
reference_type
scores
0
value 0.76577
scoring_system epss
scoring_elements 0.98933
published_at 2026-04-01T12:55:00Z
1
value 0.76577
scoring_system epss
scoring_elements 0.98943
published_at 2026-04-13T12:55:00Z
2
value 0.76577
scoring_system epss
scoring_elements 0.98945
published_at 2026-04-16T12:55:00Z
3
value 0.76577
scoring_system epss
scoring_elements 0.98935
published_at 2026-04-02T12:55:00Z
4
value 0.76577
scoring_system epss
scoring_elements 0.98937
published_at 2026-04-04T12:55:00Z
5
value 0.76577
scoring_system epss
scoring_elements 0.98939
published_at 2026-04-07T12:55:00Z
6
value 0.76577
scoring_system epss
scoring_elements 0.98941
published_at 2026-04-09T12:55:00Z
7
value 0.76577
scoring_system epss
scoring_elements 0.98942
published_at 2026-04-11T12:55:00Z
8
value 0.77542
scoring_system epss
scoring_elements 0.9899
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2063
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2063
10
reference_url http://secunia.com/advisories/40145
reference_id
reference_type
scores
url http://secunia.com/advisories/40145
11
reference_url http://secunia.com/advisories/40210
reference_id
reference_type
scores
url http://secunia.com/advisories/40210
12
reference_url http://secunia.com/advisories/40221
reference_id
reference_type
scores
url http://secunia.com/advisories/40221
13
reference_url http://secunia.com/advisories/40293
reference_id
reference_type
scores
url http://secunia.com/advisories/40293
14
reference_url http://secunia.com/advisories/42319
reference_id
reference_type
scores
url http://secunia.com/advisories/42319
15
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/59481
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/59481
16
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.471914
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.471914
17
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12427
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12427
18
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7115
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7115
19
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9859
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9859
20
reference_url http://support.apple.com/kb/HT4312
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4312
21
reference_url http://ubuntu.com/usn/usn-951-1
reference_id
reference_type
scores
url http://ubuntu.com/usn/usn-951-1
22
reference_url http://www.debian.org/security/2010/dsa-2061
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2061
23
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:119
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:119
24
reference_url http://www.redhat.com/support/errata/RHSA-2010-0488.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0488.html
25
reference_url http://www.samba.org/samba/ftp/history/samba-3.3.13.html
reference_id
reference_type
scores
url http://www.samba.org/samba/ftp/history/samba-3.3.13.html
26
reference_url http://www.samba.org/samba/ftp/patches/security/samba-3.0.37-CVE-2010-2063.patch
reference_id
reference_type
scores
url http://www.samba.org/samba/ftp/patches/security/samba-3.0.37-CVE-2010-2063.patch
27
reference_url http://www.samba.org/samba/ftp/patches/security/samba-3.3.12-CVE-2010-2063.patch
reference_id
reference_type
scores
url http://www.samba.org/samba/ftp/patches/security/samba-3.3.12-CVE-2010-2063.patch
28
reference_url http://www.samba.org/samba/security/CVE-2010-2063.html
reference_id
reference_type
scores
url http://www.samba.org/samba/security/CVE-2010-2063.html
29
reference_url http://www.securityfocus.com/bid/40884
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/40884
30
reference_url http://www.securitytracker.com/id?1024107
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1024107
31
reference_url http://www.vupen.com/english/advisories/2010/1486
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1486
32
reference_url http://www.vupen.com/english/advisories/2010/1504
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1504
33
reference_url http://www.vupen.com/english/advisories/2010/1505
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1505
34
reference_url http://www.vupen.com/english/advisories/2010/1507
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1507
35
reference_url http://www.vupen.com/english/advisories/2010/1517
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1517
36
reference_url http://www.vupen.com/english/advisories/2010/3063
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3063
37
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=601419
reference_id 601419
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=601419
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2063
reference_id CVE-2010-2063
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2063
44
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86/remote/16860.rb
reference_id CVE-2010-2063;OSVDB-65518
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86/remote/16860.rb
45
reference_url https://security.gentoo.org/glsa/201206-22
reference_id GLSA-201206-22
reference_type
scores
url https://security.gentoo.org/glsa/201206-22
46
reference_url https://access.redhat.com/errata/RHSA-2010:0488
reference_id RHSA-2010:0488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0488
47
reference_url https://usn.ubuntu.com/951-1/
reference_id USN-951-1
reference_type
scores
url https://usn.ubuntu.com/951-1/
fixed_packages
0
url pkg:deb/debian/samba@2:3.4.0~pre1-1?distro=trixie
purl pkg:deb/debian/samba@2:3.4.0~pre1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:3.4.0~pre1-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2010-2063
risk_score 10.0
exploitability 2.0
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ur8t-kfr3-1fgy
169
url VCID-v39j-84q1-j3ef
vulnerability_id VCID-v39j-84q1-j3ef
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16853.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16853.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-16853
reference_id
reference_type
scores
0
value 0.04908
scoring_system epss
scoring_elements 0.89565
published_at 2026-04-01T12:55:00Z
1
value 0.04908
scoring_system epss
scoring_elements 0.89569
published_at 2026-04-02T12:55:00Z
2
value 0.04908
scoring_system epss
scoring_elements 0.89582
published_at 2026-04-04T12:55:00Z
3
value 0.04908
scoring_system epss
scoring_elements 0.89583
published_at 2026-04-07T12:55:00Z
4
value 0.04908
scoring_system epss
scoring_elements 0.89599
published_at 2026-04-08T12:55:00Z
5
value 0.04908
scoring_system epss
scoring_elements 0.89604
published_at 2026-04-13T12:55:00Z
6
value 0.04908
scoring_system epss
scoring_elements 0.89611
published_at 2026-04-11T12:55:00Z
7
value 0.04908
scoring_system epss
scoring_elements 0.8961
published_at 2026-04-12T12:55:00Z
8
value 0.04908
scoring_system epss
scoring_elements 0.89618
published_at 2026-04-16T12:55:00Z
9
value 0.04908
scoring_system epss
scoring_elements 0.89619
published_at 2026-04-18T12:55:00Z
10
value 0.04908
scoring_system epss
scoring_elements 0.89615
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-16853
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16853
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16853
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1647246
reference_id 1647246
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1647246
4
reference_url https://security.archlinux.org/ASA-201811-22
reference_id ASA-201811-22
reference_type
scores
url https://security.archlinux.org/ASA-201811-22
5
reference_url https://security.archlinux.org/AVG-823
reference_id AVG-823
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-823
6
reference_url https://security.gentoo.org/glsa/202003-52
reference_id GLSA-202003-52
reference_type
scores
url https://security.gentoo.org/glsa/202003-52
fixed_packages
0
url pkg:deb/debian/samba@2:4.9.2%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.9.2%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.2%252Bdfsg-2%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2018-16853
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v39j-84q1-j3ef
170
url VCID-vg7n-k8px-ayd5
vulnerability_id VCID-vg7n-k8px-ayd5
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10704.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10704.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-10704
reference_id
reference_type
scores
0
value 0.08887
scoring_system epss
scoring_elements 0.92525
published_at 2026-04-01T12:55:00Z
1
value 0.08887
scoring_system epss
scoring_elements 0.92531
published_at 2026-04-02T12:55:00Z
2
value 0.08887
scoring_system epss
scoring_elements 0.92538
published_at 2026-04-04T12:55:00Z
3
value 0.08887
scoring_system epss
scoring_elements 0.92541
published_at 2026-04-07T12:55:00Z
4
value 0.08887
scoring_system epss
scoring_elements 0.92552
published_at 2026-04-08T12:55:00Z
5
value 0.08887
scoring_system epss
scoring_elements 0.92557
published_at 2026-04-09T12:55:00Z
6
value 0.08887
scoring_system epss
scoring_elements 0.92563
published_at 2026-04-13T12:55:00Z
7
value 0.08887
scoring_system epss
scoring_elements 0.92564
published_at 2026-04-12T12:55:00Z
8
value 0.08887
scoring_system epss
scoring_elements 0.92574
published_at 2026-04-18T12:55:00Z
9
value 0.08887
scoring_system epss
scoring_elements 0.92577
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-10704
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10704
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10704
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1825734
reference_id 1825734
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1825734
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960188
reference_id 960188
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960188
6
reference_url https://security.gentoo.org/glsa/202007-15
reference_id GLSA-202007-15
reference_type
scores
url https://security.gentoo.org/glsa/202007-15
7
reference_url https://usn.ubuntu.com/4341-1/
reference_id USN-4341-1
reference_type
scores
url https://usn.ubuntu.com/4341-1/
8
reference_url https://usn.ubuntu.com/4341-2/
reference_id USN-4341-2
reference_type
scores
url https://usn.ubuntu.com/4341-2/
fixed_packages
0
url pkg:deb/debian/samba@2:4.12.3%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.12.3%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.12.3%252Bdfsg-2%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2020-10704
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vg7n-k8px-ayd5
171
url VCID-vgda-wzbt-fydx
vulnerability_id VCID-vgda-wzbt-fydx
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which may allow execution of arbitrary code with root privileges.
references
0
reference_url http://openwall.com/lists/oss-security/2011/03/04/10
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/04/10
1
reference_url http://openwall.com/lists/oss-security/2011/03/04/11
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/04/11
2
reference_url http://openwall.com/lists/oss-security/2011/03/04/12
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/04/12
3
reference_url http://openwall.com/lists/oss-security/2011/03/04/9
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/04/9
4
reference_url http://openwall.com/lists/oss-security/2011/03/05/3
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/05/3
5
reference_url http://openwall.com/lists/oss-security/2011/03/05/7
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/05/7
6
reference_url http://openwall.com/lists/oss-security/2011/03/07/9
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/07/9
7
reference_url http://openwall.com/lists/oss-security/2011/03/14/16
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/14/16
8
reference_url http://openwall.com/lists/oss-security/2011/03/14/5
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/14/5
9
reference_url http://openwall.com/lists/oss-security/2011/03/14/7
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/14/7
10
reference_url http://openwall.com/lists/oss-security/2011/03/15/6
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/15/6
11
reference_url http://openwall.com/lists/oss-security/2011/03/22/4
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/22/4
12
reference_url http://openwall.com/lists/oss-security/2011/03/22/6
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/22/6
13
reference_url http://openwall.com/lists/oss-security/2011/03/31/3
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/31/3
14
reference_url http://openwall.com/lists/oss-security/2011/03/31/4
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/31/4
15
reference_url http://openwall.com/lists/oss-security/2011/04/01/2
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/04/01/2
16
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1678.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1678.json
17
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1678
reference_id
reference_type
scores
0
value 0.00677
scoring_system epss
scoring_elements 0.71522
published_at 2026-04-21T12:55:00Z
1
value 0.00677
scoring_system epss
scoring_elements 0.71455
published_at 2026-04-01T12:55:00Z
2
value 0.00677
scoring_system epss
scoring_elements 0.71462
published_at 2026-04-02T12:55:00Z
3
value 0.00677
scoring_system epss
scoring_elements 0.71479
published_at 2026-04-04T12:55:00Z
4
value 0.00677
scoring_system epss
scoring_elements 0.71452
published_at 2026-04-07T12:55:00Z
5
value 0.00677
scoring_system epss
scoring_elements 0.71492
published_at 2026-04-08T12:55:00Z
6
value 0.00677
scoring_system epss
scoring_elements 0.71504
published_at 2026-04-09T12:55:00Z
7
value 0.00677
scoring_system epss
scoring_elements 0.71526
published_at 2026-04-11T12:55:00Z
8
value 0.00677
scoring_system epss
scoring_elements 0.71511
published_at 2026-04-12T12:55:00Z
9
value 0.00677
scoring_system epss
scoring_elements 0.71493
published_at 2026-04-13T12:55:00Z
10
value 0.00677
scoring_system epss
scoring_elements 0.71539
published_at 2026-04-16T12:55:00Z
11
value 0.00677
scoring_system epss
scoring_elements 0.71544
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1678
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1678
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1678
19
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/66702
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/66702
20
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:148
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:148
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=695925
reference_id 695925
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=695925
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-1678
reference_id CVE-2011-1678
reference_type
scores
0
value 3.3
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2011-1678
24
reference_url https://security.gentoo.org/glsa/201206-22
reference_id GLSA-201206-22
reference_type
scores
url https://security.gentoo.org/glsa/201206-22
25
reference_url https://access.redhat.com/errata/RHSA-2011:1219
reference_id RHSA-2011:1219
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1219
26
reference_url https://access.redhat.com/errata/RHSA-2011:1220
reference_id RHSA-2011:1220
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1220
27
reference_url https://access.redhat.com/errata/RHSA-2011:1221
reference_id RHSA-2011:1221
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1221
28
reference_url https://usn.ubuntu.com/1226-1/
reference_id USN-1226-1
reference_type
scores
url https://usn.ubuntu.com/1226-1/
29
reference_url https://usn.ubuntu.com/1226-2/
reference_id USN-1226-2
reference_type
scores
url https://usn.ubuntu.com/1226-2/
fixed_packages
0
url pkg:deb/debian/samba@2:3.4.7~dfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:3.4.7~dfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:3.4.7~dfsg-2%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2011-1678
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vgda-wzbt-fydx
172
url VCID-vjmz-bp2f-bbc1
vulnerability_id VCID-vjmz-bp2f-bbc1
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which may allow execution of arbitrary code with root privileges.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00002.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5330.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5330.json
10
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5330
reference_id
reference_type
scores
0
value 0.01625
scoring_system epss
scoring_elements 0.81894
published_at 2026-04-21T12:55:00Z
1
value 0.01625
scoring_system epss
scoring_elements 0.81855
published_at 2026-04-13T12:55:00Z
2
value 0.01625
scoring_system epss
scoring_elements 0.81892
published_at 2026-04-18T12:55:00Z
3
value 0.01625
scoring_system epss
scoring_elements 0.81789
published_at 2026-04-01T12:55:00Z
4
value 0.01625
scoring_system epss
scoring_elements 0.818
published_at 2026-04-02T12:55:00Z
5
value 0.01625
scoring_system epss
scoring_elements 0.81822
published_at 2026-04-04T12:55:00Z
6
value 0.01625
scoring_system epss
scoring_elements 0.8182
published_at 2026-04-07T12:55:00Z
7
value 0.01625
scoring_system epss
scoring_elements 0.81846
published_at 2026-04-08T12:55:00Z
8
value 0.01625
scoring_system epss
scoring_elements 0.81853
published_at 2026-04-09T12:55:00Z
9
value 0.01625
scoring_system epss
scoring_elements 0.81872
published_at 2026-04-11T12:55:00Z
10
value 0.01625
scoring_system epss
scoring_elements 0.8186
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5330
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3223
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3223
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5252
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5252
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5296
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5299
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5330
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5330
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7540
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7540
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8467
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8467
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=0454b95657846fcecf0f51b6f1194faac02518bd
reference_id
reference_type
scores
url https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=0454b95657846fcecf0f51b6f1194faac02518bd
20
reference_url https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=538d305de91e34a2938f5f219f18bf0e1918763f
reference_id
reference_type
scores
url https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=538d305de91e34a2938f5f219f18bf0e1918763f
21
reference_url https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=7f51ec8c4ed9ba1f53d722e44fb6fb3cde933b72
reference_id
reference_type
scores
url https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=7f51ec8c4ed9ba1f53d722e44fb6fb3cde933b72
22
reference_url https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=a118d4220ed85749c07fb43c1229d9e2fecbea6b
reference_id
reference_type
scores
url https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=a118d4220ed85749c07fb43c1229d9e2fecbea6b
23
reference_url https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=ba5dbda6d0174a59d221c45cca52ecd232820d48
reference_id
reference_type
scores
url https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=ba5dbda6d0174a59d221c45cca52ecd232820d48
24
reference_url https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=f36cb71c330a52106e36028b3029d952257baf15
reference_id
reference_type
scores
url https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=f36cb71c330a52106e36028b3029d952257baf15
25
reference_url https://www.samba.org/samba/security/CVE-2015-5330.html
reference_id
reference_type
scores
url https://www.samba.org/samba/security/CVE-2015-5330.html
26
reference_url http://www.debian.org/security/2016/dsa-3433
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3433
27
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
28
reference_url http://www.securityfocus.com/bid/79734
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79734
29
reference_url http://www.securitytracker.com/id/1034493
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034493
30
reference_url http://www.ubuntu.com/usn/USN-2855-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2855-1
31
reference_url http://www.ubuntu.com/usn/USN-2855-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2855-2
32
reference_url http://www.ubuntu.com/usn/USN-2856-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2856-1
33
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1281326
reference_id 1281326
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1281326
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-5330
reference_id CVE-2015-5330
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-5330
92
reference_url https://security.gentoo.org/glsa/201612-47
reference_id GLSA-201612-47
reference_type
scores
url https://security.gentoo.org/glsa/201612-47
93
reference_url https://access.redhat.com/errata/RHSA-2016:0006
reference_id RHSA-2016:0006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0006
94
reference_url https://access.redhat.com/errata/RHSA-2016:0009
reference_id RHSA-2016:0009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0009
95
reference_url https://access.redhat.com/errata/RHSA-2016:0010
reference_id RHSA-2016:0010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0010
96
reference_url https://access.redhat.com/errata/RHSA-2016:0014
reference_id RHSA-2016:0014
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0014
97
reference_url https://access.redhat.com/errata/RHSA-2016:0015
reference_id RHSA-2016:0015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0015
98
reference_url https://access.redhat.com/errata/RHSA-2016:0016
reference_id RHSA-2016:0016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0016
99
reference_url https://usn.ubuntu.com/2855-1/
reference_id USN-2855-1
reference_type
scores
url https://usn.ubuntu.com/2855-1/
100
reference_url https://usn.ubuntu.com/2856-1/
reference_id USN-2856-1
reference_type
scores
url https://usn.ubuntu.com/2856-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.1.22%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.1.22%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.1.22%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2015-5330
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vjmz-bp2f-bbc1
173
url VCID-vjw9-u17e-rker
vulnerability_id VCID-vjw9-u17e-rker
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0686.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0686.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0686
reference_id
reference_type
scores
0
value 0.11636
scoring_system epss
scoring_elements 0.9362
published_at 2026-04-01T12:55:00Z
1
value 0.11636
scoring_system epss
scoring_elements 0.9363
published_at 2026-04-02T12:55:00Z
2
value 0.11636
scoring_system epss
scoring_elements 0.93638
published_at 2026-04-04T12:55:00Z
3
value 0.11636
scoring_system epss
scoring_elements 0.93641
published_at 2026-04-07T12:55:00Z
4
value 0.11636
scoring_system epss
scoring_elements 0.93649
published_at 2026-04-08T12:55:00Z
5
value 0.11636
scoring_system epss
scoring_elements 0.93651
published_at 2026-04-09T12:55:00Z
6
value 0.11636
scoring_system epss
scoring_elements 0.93656
published_at 2026-04-12T12:55:00Z
7
value 0.11636
scoring_system epss
scoring_elements 0.93657
published_at 2026-04-13T12:55:00Z
8
value 0.11636
scoring_system epss
scoring_elements 0.93675
published_at 2026-04-16T12:55:00Z
9
value 0.11636
scoring_system epss
scoring_elements 0.93682
published_at 2026-04-18T12:55:00Z
10
value 0.11636
scoring_system epss
scoring_elements 0.93685
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0686
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0686
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0686
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617250
reference_id 1617250
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617250
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=260838
reference_id 260838
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=260838
5
reference_url https://access.redhat.com/errata/RHSA-2004:259
reference_id RHSA-2004:259
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:259
6
reference_url https://access.redhat.com/errata/RHSA-2004:404
reference_id RHSA-2004:404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:404
fixed_packages
0
url pkg:deb/debian/samba@3.0.5?distro=trixie
purl pkg:deb/debian/samba@3.0.5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@3.0.5%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2004-0686
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vjw9-u17e-rker
174
url VCID-vk96-dpt8-2uav
vulnerability_id VCID-vk96-dpt8-2uav
summary samba: smbcacls will delete ACL lists in certain circumstances
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6442.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6442.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6442
reference_id
reference_type
scores
0
value 0.01273
scoring_system epss
scoring_elements 0.79478
published_at 2026-04-01T12:55:00Z
1
value 0.01273
scoring_system epss
scoring_elements 0.79485
published_at 2026-04-02T12:55:00Z
2
value 0.01273
scoring_system epss
scoring_elements 0.79508
published_at 2026-04-04T12:55:00Z
3
value 0.01273
scoring_system epss
scoring_elements 0.79495
published_at 2026-04-07T12:55:00Z
4
value 0.01273
scoring_system epss
scoring_elements 0.79523
published_at 2026-04-08T12:55:00Z
5
value 0.01273
scoring_system epss
scoring_elements 0.7953
published_at 2026-04-09T12:55:00Z
6
value 0.01273
scoring_system epss
scoring_elements 0.79552
published_at 2026-04-11T12:55:00Z
7
value 0.01273
scoring_system epss
scoring_elements 0.79536
published_at 2026-04-12T12:55:00Z
8
value 0.01273
scoring_system epss
scoring_elements 0.79526
published_at 2026-04-13T12:55:00Z
9
value 0.01273
scoring_system epss
scoring_elements 0.79557
published_at 2026-04-16T12:55:00Z
10
value 0.01273
scoring_system epss
scoring_elements 0.79555
published_at 2026-04-18T12:55:00Z
11
value 0.01273
scoring_system epss
scoring_elements 0.7956
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6442
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6442
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6442
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1044099
reference_id 1044099
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1044099
4
reference_url https://access.redhat.com/errata/RHSA-2014:0383
reference_id RHSA-2014:0383
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0383
fixed_packages
0
url pkg:deb/debian/samba@2:4.1.6%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.1.6%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.1.6%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2013-6442
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vk96-dpt8-2uav
175
url VCID-vnc5-neuk-m3ar
vulnerability_id VCID-vnc5-neuk-m3ar
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1472.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1472.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-1472
reference_id
reference_type
scores
0
value 0.9438
scoring_system epss
scoring_elements 0.9997
published_at 2026-04-16T12:55:00Z
1
value 0.9438
scoring_system epss
scoring_elements 0.99969
published_at 2026-04-18T12:55:00Z
2
value 0.9438
scoring_system epss
scoring_elements 0.99968
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-1472
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1472
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1879822
reference_id 1879822
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1879822
5
reference_url http://www.openwall.com/lists/oss-security/2020/09/17/2
reference_id 2
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/
url http://www.openwall.com/lists/oss-security/2020/09/17/2
6
reference_url https://www.kb.cert.org/vuls/id/490028
reference_id 490028
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/
url https://www.kb.cert.org/vuls/id/490028
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=971048
reference_id 971048
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=971048
8
reference_url https://security.archlinux.org/ASA-202009-17
reference_id ASA-202009-17
reference_type
scores
url https://security.archlinux.org/ASA-202009-17
9
reference_url https://security.archlinux.org/AVG-1236
reference_id AVG-1236
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1236
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*
reference_id cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*
reference_id cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*
reference_id cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*
19
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/49071.py
reference_id CVE-2020-1472
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/49071.py
20
reference_url https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472
reference_id CVE-2020-1472
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/
url https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472
21
reference_url https://security.gentoo.org/glsa/202012-24
reference_id GLSA-202012-24
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/
url https://security.gentoo.org/glsa/202012-24
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4OTFBL6YDVFH2TBJFJIE4FMHPJEEJK3/
reference_id H4OTFBL6YDVFH2TBJFJIE4FMHPJEEJK3
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4OTFBL6YDVFH2TBJFJIE4FMHPJEEJK3/
23
reference_url https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html
reference_id msg00041.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/
url https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html
24
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00080.html
reference_id msg00080.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00080.html
25
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00086.html
reference_id msg00086.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00086.html
26
reference_url https://access.redhat.com/errata/RHSA-2020:5439
reference_id RHSA-2020:5439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5439
27
reference_url https://access.redhat.com/errata/RHSA-2021:1647
reference_id RHSA-2021:1647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1647
28
reference_url https://access.redhat.com/errata/RHSA-2021:3723
reference_id RHSA-2021:3723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3723
29
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ST6X3A2XXYMGD4INR26DQ4FP4QSM753B/
reference_id ST6X3A2XXYMGD4INR26DQ4FP4QSM753B
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ST6X3A2XXYMGD4INR26DQ4FP4QSM753B/
30
reference_url https://www.synology.com/security/advisory/Synology_SA_20_21
reference_id Synology_SA_20_21
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/
url https://www.synology.com/security/advisory/Synology_SA_20_21
31
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TAPQQZZAT4TG3XVRTAFV2Y3S7OAHFBUP/
reference_id TAPQQZZAT4TG3XVRTAFV2Y3S7OAHFBUP
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TAPQQZZAT4TG3XVRTAFV2Y3S7OAHFBUP/
32
reference_url https://usn.ubuntu.com/4510-1/
reference_id USN-4510-1
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/
url https://usn.ubuntu.com/4510-1/
33
reference_url https://usn.ubuntu.com/4510-2/
reference_id USN-4510-2
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/
url https://usn.ubuntu.com/4510-2/
34
reference_url https://usn.ubuntu.com/4559-1/
reference_id USN-4559-1
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/
url https://usn.ubuntu.com/4559-1/
35
reference_url http://packetstormsecurity.com/files/160127/Zerologon-Netlogon-Privilege-Escalation.html
reference_id Zerologon-Netlogon-Privilege-Escalation.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/
url http://packetstormsecurity.com/files/160127/Zerologon-Netlogon-Privilege-Escalation.html
36
reference_url http://packetstormsecurity.com/files/159190/Zerologon-Proof-Of-Concept.html
reference_id Zerologon-Proof-Of-Concept.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/
url http://packetstormsecurity.com/files/159190/Zerologon-Proof-Of-Concept.html
fixed_packages
0
url pkg:deb/debian/samba@2:4.13.2%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.13.2%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.2%252Bdfsg-2%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2020-1472
risk_score 10.0
exploitability 2.0
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vnc5-neuk-m3ar
176
url VCID-vu43-fq85-a7eq
vulnerability_id VCID-vu43-fq85-a7eq
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10730.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10730.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-10730
reference_id
reference_type
scores
0
value 0.0314
scoring_system epss
scoring_elements 0.86825
published_at 2026-04-01T12:55:00Z
1
value 0.0314
scoring_system epss
scoring_elements 0.86903
published_at 2026-04-21T12:55:00Z
2
value 0.0314
scoring_system epss
scoring_elements 0.8688
published_at 2026-04-13T12:55:00Z
3
value 0.0314
scoring_system epss
scoring_elements 0.86898
published_at 2026-04-16T12:55:00Z
4
value 0.0314
scoring_system epss
scoring_elements 0.86836
published_at 2026-04-02T12:55:00Z
5
value 0.0314
scoring_system epss
scoring_elements 0.86855
published_at 2026-04-04T12:55:00Z
6
value 0.0314
scoring_system epss
scoring_elements 0.86849
published_at 2026-04-07T12:55:00Z
7
value 0.0314
scoring_system epss
scoring_elements 0.86868
published_at 2026-04-08T12:55:00Z
8
value 0.0314
scoring_system epss
scoring_elements 0.86877
published_at 2026-04-09T12:55:00Z
9
value 0.0314
scoring_system epss
scoring_elements 0.8689
published_at 2026-04-11T12:55:00Z
10
value 0.0314
scoring_system epss
scoring_elements 0.86885
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-10730
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10730
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27840
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20277
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1849489
reference_id 1849489
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1849489
7
reference_url https://security.archlinux.org/AVG-1202
reference_id AVG-1202
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1202
8
reference_url https://security.gentoo.org/glsa/202007-15
reference_id GLSA-202007-15
reference_type
scores
url https://security.gentoo.org/glsa/202007-15
9
reference_url https://access.redhat.com/errata/RHSA-2020:3118
reference_id RHSA-2020:3118
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3118
10
reference_url https://access.redhat.com/errata/RHSA-2020:3119
reference_id RHSA-2020:3119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3119
11
reference_url https://access.redhat.com/errata/RHSA-2020:4568
reference_id RHSA-2020:4568
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4568
12
reference_url https://usn.ubuntu.com/4409-1/
reference_id USN-4409-1
reference_type
scores
url https://usn.ubuntu.com/4409-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.12.5%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.12.5%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.12.5%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2020-10730
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vu43-fq85-a7eq
177
url VCID-w1jn-cvng-k7bc
vulnerability_id VCID-w1jn-cvng-k7bc
summary
Samba contains two buffer overflow vulnerabilities potentially resulting in
    the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5398.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5398.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-5398
reference_id
reference_type
scores
0
value 0.40715
scoring_system epss
scoring_elements 0.97345
published_at 2026-04-01T12:55:00Z
1
value 0.40715
scoring_system epss
scoring_elements 0.97351
published_at 2026-04-02T12:55:00Z
2
value 0.40715
scoring_system epss
scoring_elements 0.97355
published_at 2026-04-04T12:55:00Z
3
value 0.40715
scoring_system epss
scoring_elements 0.97356
published_at 2026-04-07T12:55:00Z
4
value 0.40715
scoring_system epss
scoring_elements 0.97363
published_at 2026-04-09T12:55:00Z
5
value 0.40715
scoring_system epss
scoring_elements 0.97366
published_at 2026-04-12T12:55:00Z
6
value 0.40715
scoring_system epss
scoring_elements 0.97367
published_at 2026-04-13T12:55:00Z
7
value 0.40715
scoring_system epss
scoring_elements 0.97375
published_at 2026-04-16T12:55:00Z
8
value 0.40715
scoring_system epss
scoring_elements 0.97378
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-5398
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5398
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5398
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=358831
reference_id 358831
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=358831
4
reference_url https://security.gentoo.org/glsa/200711-29
reference_id GLSA-200711-29
reference_type
scores
url https://security.gentoo.org/glsa/200711-29
5
reference_url https://access.redhat.com/errata/RHSA-2007:1013
reference_id RHSA-2007:1013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1013
6
reference_url https://access.redhat.com/errata/RHSA-2007:1016
reference_id RHSA-2007:1016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1016
7
reference_url https://access.redhat.com/errata/RHSA-2007:1017
reference_id RHSA-2007:1017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1017
8
reference_url https://access.redhat.com/errata/RHSA-2007:1034
reference_id RHSA-2007:1034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1034
9
reference_url https://usn.ubuntu.com/544-1/
reference_id USN-544-1
reference_type
scores
url https://usn.ubuntu.com/544-1/
fixed_packages
0
url pkg:deb/debian/samba@3.0.27-1?distro=trixie
purl pkg:deb/debian/samba@3.0.27-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@3.0.27-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2007-5398
risk_score 0.2
exploitability 0.5
weighted_severity 0.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w1jn-cvng-k7bc
178
url VCID-w3qg-p74x-jbff
vulnerability_id VCID-w3qg-p74x-jbff
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which may allow execution of arbitrary code with root privileges.
references
0
reference_url http://badlock.org/
reference_id
reference_type
scores
url http://badlock.org/
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html
10
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00046.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00046.html
11
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html
12
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html
13
reference_url http://rhn.redhat.com/errata/RHSA-2016-0611.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0611.html
14
reference_url http://rhn.redhat.com/errata/RHSA-2016-0612.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0612.html
15
reference_url http://rhn.redhat.com/errata/RHSA-2016-0613.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0613.html
16
reference_url http://rhn.redhat.com/errata/RHSA-2016-0614.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0614.html
17
reference_url http://rhn.redhat.com/errata/RHSA-2016-0618.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0618.html
18
reference_url http://rhn.redhat.com/errata/RHSA-2016-0619.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0619.html
19
reference_url http://rhn.redhat.com/errata/RHSA-2016-0620.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0620.html
20
reference_url http://rhn.redhat.com/errata/RHSA-2016-0621.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0621.html
21
reference_url http://rhn.redhat.com/errata/RHSA-2016-0623.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0623.html
22
reference_url http://rhn.redhat.com/errata/RHSA-2016-0624.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0624.html
23
reference_url http://rhn.redhat.com/errata/RHSA-2016-0625.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0625.html
24
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2111.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2111.json
25
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2111
reference_id
reference_type
scores
0
value 0.03786
scoring_system epss
scoring_elements 0.88081
published_at 2026-04-21T12:55:00Z
1
value 0.03786
scoring_system epss
scoring_elements 0.8807
published_at 2026-04-13T12:55:00Z
2
value 0.03786
scoring_system epss
scoring_elements 0.88083
published_at 2026-04-16T12:55:00Z
3
value 0.03786
scoring_system epss
scoring_elements 0.88011
published_at 2026-04-01T12:55:00Z
4
value 0.03786
scoring_system epss
scoring_elements 0.88021
published_at 2026-04-02T12:55:00Z
5
value 0.03786
scoring_system epss
scoring_elements 0.88035
published_at 2026-04-04T12:55:00Z
6
value 0.03786
scoring_system epss
scoring_elements 0.88041
published_at 2026-04-07T12:55:00Z
7
value 0.03786
scoring_system epss
scoring_elements 0.8806
published_at 2026-04-08T12:55:00Z
8
value 0.03786
scoring_system epss
scoring_elements 0.88066
published_at 2026-04-09T12:55:00Z
9
value 0.03786
scoring_system epss
scoring_elements 0.88076
published_at 2026-04-11T12:55:00Z
10
value 0.03786
scoring_system epss
scoring_elements 0.88069
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2111
26
reference_url https://bto.bluecoat.com/security-advisory/sa122
reference_id
reference_type
scores
url https://bto.bluecoat.com/security-advisory/sa122
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2114
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2114
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118
35
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
36
reference_url https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05087821
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05087821
37
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05082964
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05082964
38
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399
39
reference_url https://www.samba.org/samba/history/samba-4.2.10.html
reference_id
reference_type
scores
url https://www.samba.org/samba/history/samba-4.2.10.html
40
reference_url https://www.samba.org/samba/latest_news.html#4.4.2
reference_id
reference_type
scores
url https://www.samba.org/samba/latest_news.html#4.4.2
41
reference_url https://www.samba.org/samba/security/CVE-2016-2111.html
reference_id
reference_type
scores
url https://www.samba.org/samba/security/CVE-2016-2111.html
42
reference_url http://www.debian.org/security/2016/dsa-3548
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3548
43
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
44
reference_url http://www.securitytracker.com/id/1035533
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035533
45
reference_url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.458012
reference_id
reference_type
scores
url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.458012
46
reference_url http://www.ubuntu.com/usn/USN-2950-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2950-1
47
reference_url http://www.ubuntu.com/usn/USN-2950-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2950-2
48
reference_url http://www.ubuntu.com/usn/USN-2950-3
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2950-3
49
reference_url http://www.ubuntu.com/usn/USN-2950-4
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2950-4
50
reference_url http://www.ubuntu.com/usn/USN-2950-5
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2950-5
51
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1311902
reference_id 1311902
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1311902
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*
138
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*
139
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*
140
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*
141
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*
142
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*
143
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*
144
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*
145
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*
146
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*
147
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*
148
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:*
149
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:*
150
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:*
151
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.15:*:*:*:*:*:*:*
152
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.16:*:*:*:*:*:*:*
153
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*
154
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*
155
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*
156
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*
157
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*
158
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*
159
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*
160
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*
161
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*
162
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*
163
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*
164
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*
165
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.12:*:*:*:*:*:*:*
166
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.13:*:*:*:*:*:*:*
167
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.14:*:*:*:*:*:*:*
168
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.15:*:*:*:*:*:*:*
169
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.16:*:*:*:*:*:*:*
170
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.17:*:*:*:*:*:*:*
171
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*
172
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*
173
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*
174
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*
175
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*
176
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*
177
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*
178
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*
179
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*
180
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*
181
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*
182
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*
183
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*
184
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*
185
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.14:*:*:*:*:*:*:*
186
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.15:*:*:*:*:*:*:*
187
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.16:*:*:*:*:*:*:*
188
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.17:*:*:*:*:*:*:*
189
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.18:*:*:*:*:*:*:*
190
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.19:*:*:*:*:*:*:*
191
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*
192
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.20:*:*:*:*:*:*:*
193
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.21:*:*:*:*:*:*:*
194
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.22:*:*:*:*:*:*:*
195
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*
196
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*
197
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*
198
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*
199
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*
200
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*
201
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*
202
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*
203
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*
204
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*
205
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*
206
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*
207
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*
208
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*
209
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*
210
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*
211
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*
212
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*
213
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*
214
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*
215
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*
216
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*
217
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*
218
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*
219
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.24:*:*:*:*:*:*:*
220
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.25:*:*:*:*:*:*:*
221
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*
222
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*
223
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*
224
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*
225
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*
226
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*
227
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*
228
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
229
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*
230
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*
231
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*
232
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*
233
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*
234
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*
235
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*
236
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*
237
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*
238
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*
239
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*
240
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*
241
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*
242
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*
243
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*
244
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*
245
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*
246
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.25:*:*:*:*:*:*:*
247
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.26:*:*:*:*:*:*:*
248
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*
249
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*
250
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*
251
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*
252
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*
253
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*
254
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*
255
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*
256
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*
257
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*
258
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*
259
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*
260
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*
261
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*
262
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*
263
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*
264
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*
265
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*
266
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*
267
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*
268
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*
269
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*
270
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*
271
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.23:*:*:*:*:*:*:*
272
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*
273
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*
274
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*
275
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*
276
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*
277
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*
278
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*
279
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*
280
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*
281
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*
282
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*
283
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*
284
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*
285
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*
286
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*
287
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*
288
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*
289
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*
290
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*
291
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.9:*:*:*:*:*:*:*
292
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*
293
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*
294
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*
295
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*
296
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*
297
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*
298
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.6:*:*:*:*:*:*:*
299
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:*:*:*:*:*:*:*
300
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
301
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
302
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
303
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-2111
reference_id CVE-2016-2111
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:A/AC:M/Au:N/C:P/I:P/A:N
1
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-2111
304
reference_url https://security.gentoo.org/glsa/201612-47
reference_id GLSA-201612-47
reference_type
scores
url https://security.gentoo.org/glsa/201612-47
305
reference_url https://access.redhat.com/errata/RHSA-2016:0611
reference_id RHSA-2016:0611
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0611
306
reference_url https://access.redhat.com/errata/RHSA-2016:0612
reference_id RHSA-2016:0612
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0612
307
reference_url https://access.redhat.com/errata/RHSA-2016:0613
reference_id RHSA-2016:0613
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0613
308
reference_url https://access.redhat.com/errata/RHSA-2016:0614
reference_id RHSA-2016:0614
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0614
309
reference_url https://access.redhat.com/errata/RHSA-2016:0618
reference_id RHSA-2016:0618
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0618
310
reference_url https://access.redhat.com/errata/RHSA-2016:0619
reference_id RHSA-2016:0619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0619
311
reference_url https://access.redhat.com/errata/RHSA-2016:0620
reference_id RHSA-2016:0620
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0620
312
reference_url https://access.redhat.com/errata/RHSA-2016:0621
reference_id RHSA-2016:0621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0621
313
reference_url https://access.redhat.com/errata/RHSA-2016:0623
reference_id RHSA-2016:0623
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0623
314
reference_url https://access.redhat.com/errata/RHSA-2016:0624
reference_id RHSA-2016:0624
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0624
315
reference_url https://access.redhat.com/errata/RHSA-2016:0625
reference_id RHSA-2016:0625
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0625
316
reference_url https://usn.ubuntu.com/2950-1/
reference_id USN-2950-1
reference_type
scores
url https://usn.ubuntu.com/2950-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.3.7%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.3.7%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.3.7%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2016-2111
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w3qg-p74x-jbff
179
url VCID-w4c6-p858-rkaw
vulnerability_id VCID-w4c6-p858-rkaw
summary Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3670.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3670.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3670
reference_id
reference_type
scores
0
value 0.03165
scoring_system epss
scoring_elements 0.86903
published_at 2026-04-04T12:55:00Z
1
value 0.03165
scoring_system epss
scoring_elements 0.86874
published_at 2026-04-01T12:55:00Z
2
value 0.03165
scoring_system epss
scoring_elements 0.86885
published_at 2026-04-02T12:55:00Z
3
value 0.03426
scoring_system epss
scoring_elements 0.87472
published_at 2026-04-11T12:55:00Z
4
value 0.03426
scoring_system epss
scoring_elements 0.87467
published_at 2026-04-12T12:55:00Z
5
value 0.03426
scoring_system epss
scoring_elements 0.87464
published_at 2026-04-13T12:55:00Z
6
value 0.03426
scoring_system epss
scoring_elements 0.87478
published_at 2026-04-21T12:55:00Z
7
value 0.03426
scoring_system epss
scoring_elements 0.8748
published_at 2026-04-18T12:55:00Z
8
value 0.03426
scoring_system epss
scoring_elements 0.87435
published_at 2026-04-07T12:55:00Z
9
value 0.03426
scoring_system epss
scoring_elements 0.87453
published_at 2026-04-08T12:55:00Z
10
value 0.03426
scoring_system epss
scoring_elements 0.8746
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3670
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3670
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2077533
reference_id 2077533
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2077533
5
reference_url https://security.gentoo.org/glsa/202309-06
reference_id GLSA-202309-06
reference_type
scores
url https://security.gentoo.org/glsa/202309-06
6
reference_url https://usn.ubuntu.com/5542-1/
reference_id USN-5542-1
reference_type
scores
url https://usn.ubuntu.com/5542-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.16.0%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.16.0%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.16.0%252Bdfsg-2%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2021-3670
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w4c6-p858-rkaw
180
url VCID-wbrt-6f84-p3gu
vulnerability_id VCID-wbrt-6f84-p3gu
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1057.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1057.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1057
reference_id
reference_type
scores
0
value 0.07722
scoring_system epss
scoring_elements 0.9189
published_at 2026-04-01T12:55:00Z
1
value 0.07722
scoring_system epss
scoring_elements 0.91899
published_at 2026-04-02T12:55:00Z
2
value 0.07722
scoring_system epss
scoring_elements 0.91906
published_at 2026-04-04T12:55:00Z
3
value 0.07722
scoring_system epss
scoring_elements 0.91913
published_at 2026-04-07T12:55:00Z
4
value 0.07722
scoring_system epss
scoring_elements 0.91926
published_at 2026-04-08T12:55:00Z
5
value 0.07722
scoring_system epss
scoring_elements 0.91931
published_at 2026-04-13T12:55:00Z
6
value 0.07722
scoring_system epss
scoring_elements 0.91935
published_at 2026-04-11T12:55:00Z
7
value 0.07722
scoring_system epss
scoring_elements 0.91934
published_at 2026-04-12T12:55:00Z
8
value 0.07722
scoring_system epss
scoring_elements 0.9195
published_at 2026-04-16T12:55:00Z
9
value 0.07722
scoring_system epss
scoring_elements 0.91946
published_at 2026-04-18T12:55:00Z
10
value 0.07722
scoring_system epss
scoring_elements 0.91943
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1057
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1050
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1050
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1057
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1057
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1553553
reference_id 1553553
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1553553
5
reference_url https://security.archlinux.org/ASA-201803-10
reference_id ASA-201803-10
reference_type
scores
url https://security.archlinux.org/ASA-201803-10
6
reference_url https://security.archlinux.org/AVG-651
reference_id AVG-651
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-651
7
reference_url https://security.gentoo.org/glsa/201805-07
reference_id GLSA-201805-07
reference_type
scores
url https://security.gentoo.org/glsa/201805-07
8
reference_url https://usn.ubuntu.com/3595-1/
reference_id USN-3595-1
reference_type
scores
url https://usn.ubuntu.com/3595-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.7.4%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.7.4%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.7.4%252Bdfsg-2%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2018-1057
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wbrt-6f84-p3gu
181
url VCID-wdp2-qcyp-eucu
vulnerability_id VCID-wdp2-qcyp-eucu
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00050.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00050.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00106.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00106.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3880.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3880.json
3
reference_url https://access.redhat.com/security/cve/cve-2019-3880
reference_id
reference_type
scores
url https://access.redhat.com/security/cve/cve-2019-3880
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-3880
reference_id
reference_type
scores
0
value 0.03388
scoring_system epss
scoring_elements 0.87346
published_at 2026-04-01T12:55:00Z
1
value 0.03388
scoring_system epss
scoring_elements 0.87411
published_at 2026-04-21T12:55:00Z
2
value 0.03388
scoring_system epss
scoring_elements 0.87403
published_at 2026-04-12T12:55:00Z
3
value 0.03388
scoring_system epss
scoring_elements 0.87399
published_at 2026-04-13T12:55:00Z
4
value 0.03388
scoring_system epss
scoring_elements 0.87414
published_at 2026-04-16T12:55:00Z
5
value 0.03388
scoring_system epss
scoring_elements 0.87417
published_at 2026-04-18T12:55:00Z
6
value 0.03388
scoring_system epss
scoring_elements 0.87356
published_at 2026-04-02T12:55:00Z
7
value 0.03388
scoring_system epss
scoring_elements 0.87371
published_at 2026-04-07T12:55:00Z
8
value 0.03388
scoring_system epss
scoring_elements 0.87389
published_at 2026-04-08T12:55:00Z
9
value 0.03388
scoring_system epss
scoring_elements 0.87396
published_at 2026-04-09T12:55:00Z
10
value 0.03388
scoring_system epss
scoring_elements 0.87408
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-3880
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3880
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3880
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3880
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3880
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://lists.debian.org/debian-lts-announce/2019/04/msg00013.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/04/msg00013.html
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6354GALK73CZWQKFUG7AWB6EIEGFMF62/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6354GALK73CZWQKFUG7AWB6EIEGFMF62/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HSRLRO7BPRFETVFZ4TVJL2VFZEPHKJY4/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HSRLRO7BPRFETVFZ4TVJL2VFZEPHKJY4/
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JTJVFA3RZ6G2IZDTVKLHRMX6QBYA4GPA/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JTJVFA3RZ6G2IZDTVKLHRMX6QBYA4GPA/
12
reference_url https://security.netapp.com/advisory/ntap-20190411-0004/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190411-0004/
13
reference_url https://support.f5.com/csp/article/K20804356
reference_id
reference_type
scores
url https://support.f5.com/csp/article/K20804356
14
reference_url https://www.samba.org/samba/security/CVE-2019-3880.html
reference_id
reference_type
scores
url https://www.samba.org/samba/security/CVE-2019-3880.html
15
reference_url https://www.synology.com/security/advisory/Synology_SA_19_15
reference_id
reference_type
scores
url https://www.synology.com/security/advisory/Synology_SA_19_15
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1691518
reference_id 1691518
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1691518
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:gluster_storage:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:gluster_storage:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:gluster_storage:3.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-3880
reference_id CVE-2019-3880
reference_type
scores
0
value 5.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:P/A:P
1
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
2
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2019-3880
26
reference_url https://access.redhat.com/errata/RHSA-2019:1966
reference_id RHSA-2019:1966
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1966
27
reference_url https://access.redhat.com/errata/RHSA-2019:1967
reference_id RHSA-2019:1967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1967
28
reference_url https://access.redhat.com/errata/RHSA-2019:2099
reference_id RHSA-2019:2099
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2099
29
reference_url https://access.redhat.com/errata/RHSA-2019:3582
reference_id RHSA-2019:3582
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3582
30
reference_url https://usn.ubuntu.com/3939-1/
reference_id USN-3939-1
reference_type
scores
url https://usn.ubuntu.com/3939-1/
31
reference_url https://usn.ubuntu.com/3939-2/
reference_id USN-3939-2
reference_type
scores
url https://usn.ubuntu.com/3939-2/
fixed_packages
0
url pkg:deb/debian/samba@2:4.9.5%2Bdfsg-3?distro=trixie
purl pkg:deb/debian/samba@2:4.9.5%2Bdfsg-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-3%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2019-3880
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wdp2-qcyp-eucu
182
url VCID-wfhc-ehpe-abaq
vulnerability_id VCID-wfhc-ehpe-abaq
summary samba: Symlink race error can allow directory creation outside of the exported share
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43566.json
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43566.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-43566
reference_id
reference_type
scores
0
value 0.00361
scoring_system epss
scoring_elements 0.58129
published_at 2026-04-01T12:55:00Z
1
value 0.00361
scoring_system epss
scoring_elements 0.58215
published_at 2026-04-02T12:55:00Z
2
value 0.00361
scoring_system epss
scoring_elements 0.58235
published_at 2026-04-04T12:55:00Z
3
value 0.00361
scoring_system epss
scoring_elements 0.5821
published_at 2026-04-07T12:55:00Z
4
value 0.00361
scoring_system epss
scoring_elements 0.58264
published_at 2026-04-08T12:55:00Z
5
value 0.00361
scoring_system epss
scoring_elements 0.58269
published_at 2026-04-09T12:55:00Z
6
value 0.00361
scoring_system epss
scoring_elements 0.58287
published_at 2026-04-11T12:55:00Z
7
value 0.00361
scoring_system epss
scoring_elements 0.58263
published_at 2026-04-12T12:55:00Z
8
value 0.00361
scoring_system epss
scoring_elements 0.58243
published_at 2026-04-13T12:55:00Z
9
value 0.00361
scoring_system epss
scoring_elements 0.58275
published_at 2026-04-16T12:55:00Z
10
value 0.00361
scoring_system epss
scoring_elements 0.58277
published_at 2026-04-18T12:55:00Z
11
value 0.00361
scoring_system epss
scoring_elements 0.58252
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-43566
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43566
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004691
reference_id 1004691
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004691
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2009676
reference_id 2009676
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2009676
6
reference_url https://usn.ubuntu.com/5260-1/
reference_id USN-5260-1
reference_type
scores
url https://usn.ubuntu.com/5260-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u4?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u4%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.16.0%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.16.0%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.16.0%252Bdfsg-2%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
6
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2021-43566
risk_score 1.1
exploitability 0.5
weighted_severity 2.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wfhc-ehpe-abaq
183
url VCID-wjjn-evnj-3fcb
vulnerability_id VCID-wjjn-evnj-3fcb
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which may allow execution of arbitrary code with root privileges.
references
0
reference_url http://git.samba.org/?p=samba.git%3Ba=commit%3Bh=9280051bfba337458722fb157f3082f93cbd9f2b
reference_id
reference_type
scores
url http://git.samba.org/?p=samba.git%3Ba=commit%3Bh=9280051bfba337458722fb157f3082f93cbd9f2b
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1642.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1642.json
2
reference_url http://samba.org/samba/history/samba-3.4.8.html
reference_id
reference_type
scores
url http://samba.org/samba/history/samba-3.4.8.html
3
reference_url http://samba.org/samba/history/samba-3.5.2.html
reference_id
reference_type
scores
url http://samba.org/samba/history/samba-3.5.2.html
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-1642
reference_id
reference_type
scores
0
value 0.05054
scoring_system epss
scoring_elements 0.89786
published_at 2026-04-21T12:55:00Z
1
value 0.05054
scoring_system epss
scoring_elements 0.89734
published_at 2026-04-01T12:55:00Z
2
value 0.05054
scoring_system epss
scoring_elements 0.89737
published_at 2026-04-02T12:55:00Z
3
value 0.05054
scoring_system epss
scoring_elements 0.89752
published_at 2026-04-04T12:55:00Z
4
value 0.05054
scoring_system epss
scoring_elements 0.89754
published_at 2026-04-07T12:55:00Z
5
value 0.05054
scoring_system epss
scoring_elements 0.89771
published_at 2026-04-08T12:55:00Z
6
value 0.05054
scoring_system epss
scoring_elements 0.89777
published_at 2026-04-09T12:55:00Z
7
value 0.05054
scoring_system epss
scoring_elements 0.89784
published_at 2026-04-11T12:55:00Z
8
value 0.05054
scoring_system epss
scoring_elements 0.89782
published_at 2026-04-12T12:55:00Z
9
value 0.05054
scoring_system epss
scoring_elements 0.89775
published_at 2026-04-13T12:55:00Z
10
value 0.05054
scoring_system epss
scoring_elements 0.89791
published_at 2026-04-16T12:55:00Z
11
value 0.05054
scoring_system epss
scoring_elements 0.89792
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-1642
5
reference_url https://bugzilla.samba.org/show_bug.cgi?id=7254
reference_id
reference_type
scores
url https://bugzilla.samba.org/show_bug.cgi?id=7254
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1642
7
reference_url http://security-tracker.debian.org/tracker/CVE-2010-1642
reference_id
reference_type
scores
url http://security-tracker.debian.org/tracker/CVE-2010-1642
8
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:141
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:141
9
reference_url http://www.securityfocus.com/bid/40097
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/40097
10
reference_url http://www.stratsec.net/Research/Advisories/Samba-Multiple-DoS-Vulnerabilities-%28SS-2010-005%29
reference_id
reference_type
scores
url http://www.stratsec.net/Research/Advisories/Samba-Multiple-DoS-Vulnerabilities-%28SS-2010-005%29
11
reference_url http://www.vupen.com/english/advisories/2010/1933
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1933
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=594921
reference_id 594921
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=594921
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.27a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27a:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.28a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28a:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.1.0:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5:*:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-1642
reference_id CVE-2010-1642
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-1642
118
reference_url https://security.gentoo.org/glsa/201206-22
reference_id GLSA-201206-22
reference_type
scores
url https://security.gentoo.org/glsa/201206-22
fixed_packages
0
url pkg:deb/debian/samba@2:3.5.4~dfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:3.5.4~dfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:3.5.4~dfsg-2%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2010-1642
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wjjn-evnj-3fcb
184
url VCID-wjys-r7vj-xbe3
vulnerability_id VCID-wjys-r7vj-xbe3
summary
Multiple vulnerabilities were found in mount-cifs, the worst of
    which leading to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0787.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0787.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0787
reference_id
reference_type
scores
0
value 0.00503
scoring_system epss
scoring_elements 0.66024
published_at 2026-04-01T12:55:00Z
1
value 0.00503
scoring_system epss
scoring_elements 0.66065
published_at 2026-04-02T12:55:00Z
2
value 0.00503
scoring_system epss
scoring_elements 0.66093
published_at 2026-04-04T12:55:00Z
3
value 0.00503
scoring_system epss
scoring_elements 0.66061
published_at 2026-04-07T12:55:00Z
4
value 0.00503
scoring_system epss
scoring_elements 0.66109
published_at 2026-04-08T12:55:00Z
5
value 0.00503
scoring_system epss
scoring_elements 0.66122
published_at 2026-04-09T12:55:00Z
6
value 0.00503
scoring_system epss
scoring_elements 0.66141
published_at 2026-04-11T12:55:00Z
7
value 0.00503
scoring_system epss
scoring_elements 0.66128
published_at 2026-04-12T12:55:00Z
8
value 0.00503
scoring_system epss
scoring_elements 0.66099
published_at 2026-04-13T12:55:00Z
9
value 0.00503
scoring_system epss
scoring_elements 0.66134
published_at 2026-04-16T12:55:00Z
10
value 0.00503
scoring_system epss
scoring_elements 0.66148
published_at 2026-04-18T12:55:00Z
11
value 0.00503
scoring_system epss
scoring_elements 0.66135
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0787
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0787
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=567554
reference_id 567554
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=567554
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=577277
reference_id 577277
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=577277
5
reference_url https://security.gentoo.org/glsa/201206-29
reference_id GLSA-201206-29
reference_type
scores
url https://security.gentoo.org/glsa/201206-29
6
reference_url https://access.redhat.com/errata/RHSA-2011:1219
reference_id RHSA-2011:1219
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1219
7
reference_url https://usn.ubuntu.com/893-1/
reference_id USN-893-1
reference_type
scores
url https://usn.ubuntu.com/893-1/
fixed_packages
0
url pkg:deb/debian/samba@2:3.4.5~dfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:3.4.5~dfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:3.4.5~dfsg-2%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2010-0787
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wjys-r7vj-xbe3
185
url VCID-wk1w-4jdv-wqhn
vulnerability_id VCID-wk1w-4jdv-wqhn
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which may allow remote execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2016-07/msg00060.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-07/msg00060.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2016-1486.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1486.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2016-1487.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1487.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2016-1494.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1494.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2119.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2119.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2119
reference_id
reference_type
scores
0
value 0.01522
scoring_system epss
scoring_elements 0.81193
published_at 2026-04-01T12:55:00Z
1
value 0.01522
scoring_system epss
scoring_elements 0.81294
published_at 2026-04-18T12:55:00Z
2
value 0.01522
scoring_system epss
scoring_elements 0.81264
published_at 2026-04-12T12:55:00Z
3
value 0.01522
scoring_system epss
scoring_elements 0.81256
published_at 2026-04-13T12:55:00Z
4
value 0.01522
scoring_system epss
scoring_elements 0.81293
published_at 2026-04-21T12:55:00Z
5
value 0.01522
scoring_system epss
scoring_elements 0.81201
published_at 2026-04-02T12:55:00Z
6
value 0.01522
scoring_system epss
scoring_elements 0.81224
published_at 2026-04-07T12:55:00Z
7
value 0.01522
scoring_system epss
scoring_elements 0.81252
published_at 2026-04-08T12:55:00Z
8
value 0.01522
scoring_system epss
scoring_elements 0.81257
published_at 2026-04-09T12:55:00Z
9
value 0.01522
scoring_system epss
scoring_elements 0.81278
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2119
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2119
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2119
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2123
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2125
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2126
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2126
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:A/AC:M/Au:N/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://www.samba.org/samba/security/CVE-2016-2119.html
reference_id
reference_type
scores
url https://www.samba.org/samba/security/CVE-2016-2119.html
12
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
13
reference_url http://www.securityfocus.com/bid/91700
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/91700
14
reference_url http://www.securitytracker.com/id/1036244
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1036244
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1351955
reference_id 1351955
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1351955
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=830195
reference_id 830195
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=830195
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-2119
reference_id CVE-2016-2119
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-2119
19
reference_url https://security.gentoo.org/glsa/201805-07
reference_id GLSA-201805-07
reference_type
scores
url https://security.gentoo.org/glsa/201805-07
20
reference_url https://access.redhat.com/errata/RHSA-2016:1486
reference_id RHSA-2016:1486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1486
21
reference_url https://access.redhat.com/errata/RHSA-2016:1487
reference_id RHSA-2016:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1487
22
reference_url https://access.redhat.com/errata/RHSA-2016:1494
reference_id RHSA-2016:1494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1494
23
reference_url https://usn.ubuntu.com/3092-1/
reference_id USN-3092-1
reference_type
scores
url https://usn.ubuntu.com/3092-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.4.5%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.4.5%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.4.5%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2016-2119
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wk1w-4jdv-wqhn
186
url VCID-wpvs-jabz-2ye3
vulnerability_id VCID-wpvs-jabz-2ye3
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16841.json
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16841.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-16841
reference_id
reference_type
scores
0
value 0.07105
scoring_system epss
scoring_elements 0.91489
published_at 2026-04-01T12:55:00Z
1
value 0.07105
scoring_system epss
scoring_elements 0.91552
published_at 2026-04-21T12:55:00Z
2
value 0.07105
scoring_system epss
scoring_elements 0.91534
published_at 2026-04-13T12:55:00Z
3
value 0.07105
scoring_system epss
scoring_elements 0.91557
published_at 2026-04-16T12:55:00Z
4
value 0.07105
scoring_system epss
scoring_elements 0.91496
published_at 2026-04-02T12:55:00Z
5
value 0.07105
scoring_system epss
scoring_elements 0.91503
published_at 2026-04-04T12:55:00Z
6
value 0.07105
scoring_system epss
scoring_elements 0.9151
published_at 2026-04-07T12:55:00Z
7
value 0.07105
scoring_system epss
scoring_elements 0.91524
published_at 2026-04-08T12:55:00Z
8
value 0.07105
scoring_system epss
scoring_elements 0.9153
published_at 2026-04-09T12:55:00Z
9
value 0.07105
scoring_system epss
scoring_elements 0.91535
published_at 2026-04-11T12:55:00Z
10
value 0.07105
scoring_system epss
scoring_elements 0.91536
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-16841
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14629
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16841
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16841
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16851
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1642545
reference_id 1642545
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1642545
7
reference_url https://security.archlinux.org/ASA-201811-22
reference_id ASA-201811-22
reference_type
scores
url https://security.archlinux.org/ASA-201811-22
8
reference_url https://security.archlinux.org/AVG-823
reference_id AVG-823
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-823
9
reference_url https://security.gentoo.org/glsa/202003-52
reference_id GLSA-202003-52
reference_type
scores
url https://security.gentoo.org/glsa/202003-52
10
reference_url https://usn.ubuntu.com/3827-1/
reference_id USN-3827-1
reference_type
scores
url https://usn.ubuntu.com/3827-1/
11
reference_url https://usn.ubuntu.com/3827-2/
reference_id USN-3827-2
reference_type
scores
url https://usn.ubuntu.com/3827-2/
fixed_packages
0
url pkg:deb/debian/samba@2:4.9.2%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.9.2%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.2%252Bdfsg-2%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2018-16841
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wpvs-jabz-2ye3
187
url VCID-ws2g-8ye2-pkdk
vulnerability_id VCID-ws2g-8ye2-pkdk
summary samba: Null pointer dereference on missing sname in TGS-REQ
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3671.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3671.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3671
reference_id
reference_type
scores
0
value 0.03013
scoring_system epss
scoring_elements 0.86538
published_at 2026-04-01T12:55:00Z
1
value 0.03013
scoring_system epss
scoring_elements 0.86618
published_at 2026-04-18T12:55:00Z
2
value 0.03013
scoring_system epss
scoring_elements 0.86599
published_at 2026-04-13T12:55:00Z
3
value 0.03013
scoring_system epss
scoring_elements 0.86613
published_at 2026-04-16T12:55:00Z
4
value 0.03013
scoring_system epss
scoring_elements 0.86548
published_at 2026-04-02T12:55:00Z
5
value 0.03013
scoring_system epss
scoring_elements 0.86567
published_at 2026-04-04T12:55:00Z
6
value 0.03013
scoring_system epss
scoring_elements 0.86568
published_at 2026-04-07T12:55:00Z
7
value 0.03013
scoring_system epss
scoring_elements 0.86586
published_at 2026-04-08T12:55:00Z
8
value 0.03013
scoring_system epss
scoring_elements 0.86596
published_at 2026-04-09T12:55:00Z
9
value 0.03013
scoring_system epss
scoring_elements 0.8661
published_at 2026-04-21T12:55:00Z
10
value 0.03013
scoring_system epss
scoring_elements 0.86607
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3671
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2013080
reference_id 2013080
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2013080
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=996586
reference_id 996586
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=996586
11
reference_url https://security.archlinux.org/AVG-2418
reference_id AVG-2418
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2418
12
reference_url https://usn.ubuntu.com/5142-1/
reference_id USN-5142-1
reference_type
scores
url https://usn.ubuntu.com/5142-1/
13
reference_url https://usn.ubuntu.com/5174-1/
reference_id USN-5174-1
reference_type
scores
url https://usn.ubuntu.com/5174-1/
14
reference_url https://usn.ubuntu.com/5675-1/
reference_id USN-5675-1
reference_type
scores
url https://usn.ubuntu.com/5675-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u1?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
6
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2021-3671
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ws2g-8ye2-pkdk
188
url VCID-wxva-f9ay-c3a2
vulnerability_id VCID-wxva-f9ay-c3a2
summary Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20316.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20316.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-20316
reference_id
reference_type
scores
0
value 0.00712
scoring_system epss
scoring_elements 0.72249
published_at 2026-04-01T12:55:00Z
1
value 0.00712
scoring_system epss
scoring_elements 0.72255
published_at 2026-04-02T12:55:00Z
2
value 0.00712
scoring_system epss
scoring_elements 0.72274
published_at 2026-04-04T12:55:00Z
3
value 0.00712
scoring_system epss
scoring_elements 0.7225
published_at 2026-04-07T12:55:00Z
4
value 0.00712
scoring_system epss
scoring_elements 0.72289
published_at 2026-04-08T12:55:00Z
5
value 0.00712
scoring_system epss
scoring_elements 0.72301
published_at 2026-04-09T12:55:00Z
6
value 0.00712
scoring_system epss
scoring_elements 0.72323
published_at 2026-04-11T12:55:00Z
7
value 0.00712
scoring_system epss
scoring_elements 0.72307
published_at 2026-04-12T12:55:00Z
8
value 0.00712
scoring_system epss
scoring_elements 0.72294
published_at 2026-04-13T12:55:00Z
9
value 0.00712
scoring_system epss
scoring_elements 0.72336
published_at 2026-04-16T12:55:00Z
10
value 0.00712
scoring_system epss
scoring_elements 0.72345
published_at 2026-04-18T12:55:00Z
11
value 0.00712
scoring_system epss
scoring_elements 0.72333
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-20316
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20316
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20316
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004690
reference_id 1004690
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004690
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2009673
reference_id 2009673
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2009673
6
reference_url https://security.gentoo.org/glsa/202309-06
reference_id GLSA-202309-06
reference_type
scores
url https://security.gentoo.org/glsa/202309-06
7
reference_url https://access.redhat.com/errata/RHSA-2022:1756
reference_id RHSA-2022:1756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1756
8
reference_url https://access.redhat.com/errata/RHSA-2022:2074
reference_id RHSA-2022:2074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2074
fixed_packages
0
url pkg:deb/debian/samba@2:4.16.0%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.16.0%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.16.0%252Bdfsg-2%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2021-20316
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wxva-f9ay-c3a2
189
url VCID-x3bk-7vqp-3qgy
vulnerability_id VCID-x3bk-7vqp-3qgy
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0178.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0178.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-0178
reference_id
reference_type
scores
0
value 0.01917
scoring_system epss
scoring_elements 0.83249
published_at 2026-04-01T12:55:00Z
1
value 0.01917
scoring_system epss
scoring_elements 0.83266
published_at 2026-04-02T12:55:00Z
2
value 0.01917
scoring_system epss
scoring_elements 0.8328
published_at 2026-04-07T12:55:00Z
3
value 0.01917
scoring_system epss
scoring_elements 0.83304
published_at 2026-04-08T12:55:00Z
4
value 0.01917
scoring_system epss
scoring_elements 0.83313
published_at 2026-04-09T12:55:00Z
5
value 0.01917
scoring_system epss
scoring_elements 0.83328
published_at 2026-04-11T12:55:00Z
6
value 0.01917
scoring_system epss
scoring_elements 0.83322
published_at 2026-04-12T12:55:00Z
7
value 0.01917
scoring_system epss
scoring_elements 0.83318
published_at 2026-04-13T12:55:00Z
8
value 0.01917
scoring_system epss
scoring_elements 0.83353
published_at 2026-04-16T12:55:00Z
9
value 0.01917
scoring_system epss
scoring_elements 0.83354
published_at 2026-04-18T12:55:00Z
10
value 0.01917
scoring_system epss
scoring_elements 0.83356
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-0178
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0178
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0244
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3493
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1101992
reference_id 1101992
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1101992
6
reference_url https://security.gentoo.org/glsa/201502-15
reference_id GLSA-201502-15
reference_type
scores
url https://security.gentoo.org/glsa/201502-15
7
reference_url https://access.redhat.com/errata/RHSA-2014:0867
reference_id RHSA-2014:0867
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0867
8
reference_url https://access.redhat.com/errata/RHSA-2014:1009
reference_id RHSA-2014:1009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1009
9
reference_url https://usn.ubuntu.com/2257-1/
reference_id USN-2257-1
reference_type
scores
url https://usn.ubuntu.com/2257-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.1.8%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.1.8%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.1.8%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2014-0178
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x3bk-7vqp-3qgy
190
url VCID-xjqj-hy9t-nfb7
vulnerability_id VCID-xjqj-hy9t-nfb7
summary security update
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2017-0494.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2017-0494.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2017-0495.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2017-0495.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2017-0662.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2017-0662.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2017-0744.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2017-0744.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2126.json
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2126.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2126
reference_id
reference_type
scores
0
value 0.04684
scoring_system epss
scoring_elements 0.89297
published_at 2026-04-01T12:55:00Z
1
value 0.04684
scoring_system epss
scoring_elements 0.89351
published_at 2026-04-21T12:55:00Z
2
value 0.04684
scoring_system epss
scoring_elements 0.89345
published_at 2026-04-12T12:55:00Z
3
value 0.04684
scoring_system epss
scoring_elements 0.89341
published_at 2026-04-13T12:55:00Z
4
value 0.04684
scoring_system epss
scoring_elements 0.89356
published_at 2026-04-16T12:55:00Z
5
value 0.04684
scoring_system epss
scoring_elements 0.89355
published_at 2026-04-18T12:55:00Z
6
value 0.04684
scoring_system epss
scoring_elements 0.89302
published_at 2026-04-02T12:55:00Z
7
value 0.04684
scoring_system epss
scoring_elements 0.89316
published_at 2026-04-04T12:55:00Z
8
value 0.04684
scoring_system epss
scoring_elements 0.89318
published_at 2026-04-07T12:55:00Z
9
value 0.04684
scoring_system epss
scoring_elements 0.89335
published_at 2026-04-08T12:55:00Z
10
value 0.04684
scoring_system epss
scoring_elements 0.89339
published_at 2026-04-09T12:55:00Z
11
value 0.04684
scoring_system epss
scoring_elements 0.89348
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2126
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2119
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2119
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2123
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2125
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2126
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2126
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.3
scoring_system cvssv2
scoring_elements AV:A/AC:M/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43730
reference_id
reference_type
scores
url https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43730
12
reference_url https://www.samba.org/samba/security/CVE-2016-2126.html
reference_id
reference_type
scores
url https://www.samba.org/samba/security/CVE-2016-2126.html
13
reference_url http://www.securityfocus.com/bid/94994
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/94994
14
reference_url http://www.securitytracker.com/id/1037495
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1037495
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1403115
reference_id 1403115
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1403115
16
reference_url https://security.archlinux.org/ASA-201612-19
reference_id ASA-201612-19
reference_type
scores
url https://security.archlinux.org/ASA-201612-19
17
reference_url https://security.archlinux.org/AVG-111
reference_id AVG-111
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-111
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-2126
reference_id CVE-2016-2126
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-2126
20
reference_url https://access.redhat.com/errata/RHSA-2017:0494
reference_id RHSA-2017:0494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0494
21
reference_url https://access.redhat.com/errata/RHSA-2017:0495
reference_id RHSA-2017:0495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0495
22
reference_url https://access.redhat.com/errata/RHSA-2017:0662
reference_id RHSA-2017:0662
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0662
23
reference_url https://access.redhat.com/errata/RHSA-2017:0744
reference_id RHSA-2017:0744
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0744
24
reference_url https://access.redhat.com/errata/RHSA-2017:1265
reference_id RHSA-2017:1265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1265
25
reference_url https://usn.ubuntu.com/3158-1/
reference_id USN-3158-1
reference_type
scores
url https://usn.ubuntu.com/3158-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.5.2%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.5.2%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.5.2%252Bdfsg-2%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2016-2126
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xjqj-hy9t-nfb7
191
url VCID-xmn1-g72k-8qcq
vulnerability_id VCID-xmn1-g72k-8qcq
summary Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-37966.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-37966.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-37966
reference_id
reference_type
scores
0
value 0.01378
scoring_system epss
scoring_elements 0.80295
published_at 2026-04-21T12:55:00Z
1
value 0.01378
scoring_system epss
scoring_elements 0.80265
published_at 2026-04-12T12:55:00Z
2
value 0.01378
scoring_system epss
scoring_elements 0.80259
published_at 2026-04-13T12:55:00Z
3
value 0.01378
scoring_system epss
scoring_elements 0.80289
published_at 2026-04-16T12:55:00Z
4
value 0.01378
scoring_system epss
scoring_elements 0.80291
published_at 2026-04-18T12:55:00Z
5
value 0.01378
scoring_system epss
scoring_elements 0.80215
published_at 2026-04-02T12:55:00Z
6
value 0.01378
scoring_system epss
scoring_elements 0.80235
published_at 2026-04-04T12:55:00Z
7
value 0.01378
scoring_system epss
scoring_elements 0.80224
published_at 2026-04-07T12:55:00Z
8
value 0.01378
scoring_system epss
scoring_elements 0.80252
published_at 2026-04-08T12:55:00Z
9
value 0.01378
scoring_system epss
scoring_elements 0.80262
published_at 2026-04-09T12:55:00Z
10
value 0.01378
scoring_system epss
scoring_elements 0.8028
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-37966
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37966
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37966
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2154303
reference_id 2154303
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2154303
5
reference_url https://security.archlinux.org/AVG-2828
reference_id AVG-2828
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2828
6
reference_url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37966
reference_id CVE-2022-37966
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T13:50:56Z/
url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37966
7
reference_url https://security.gentoo.org/glsa/202309-06
reference_id GLSA-202309-06
reference_type
scores
url https://security.gentoo.org/glsa/202309-06
8
reference_url https://usn.ubuntu.com/5822-1/
reference_id USN-5822-1
reference_type
scores
url https://usn.ubuntu.com/5822-1/
9
reference_url https://usn.ubuntu.com/5936-1/
reference_id USN-5936-1
reference_type
scores
url https://usn.ubuntu.com/5936-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.17.4%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.17.4%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.4%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2022-37966
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xmn1-g72k-8qcq
192
url VCID-xwke-mduk-kyga
vulnerability_id VCID-xwke-mduk-kyga
summary Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32744.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32744.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32744
reference_id
reference_type
scores
0
value 0.00424
scoring_system epss
scoring_elements 0.62128
published_at 2026-04-02T12:55:00Z
1
value 0.00475
scoring_system epss
scoring_elements 0.64828
published_at 2026-04-21T12:55:00Z
2
value 0.00475
scoring_system epss
scoring_elements 0.6483
published_at 2026-04-16T12:55:00Z
3
value 0.00475
scoring_system epss
scoring_elements 0.64841
published_at 2026-04-18T12:55:00Z
4
value 0.00475
scoring_system epss
scoring_elements 0.64787
published_at 2026-04-04T12:55:00Z
5
value 0.00475
scoring_system epss
scoring_elements 0.6475
published_at 2026-04-07T12:55:00Z
6
value 0.00475
scoring_system epss
scoring_elements 0.64799
published_at 2026-04-08T12:55:00Z
7
value 0.00475
scoring_system epss
scoring_elements 0.64814
published_at 2026-04-09T12:55:00Z
8
value 0.00475
scoring_system epss
scoring_elements 0.64831
published_at 2026-04-11T12:55:00Z
9
value 0.00475
scoring_system epss
scoring_elements 0.6482
published_at 2026-04-12T12:55:00Z
10
value 0.00475
scoring_system epss
scoring_elements 0.64792
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32744
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449
reference_id 1016449
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2108205
reference_id 2108205
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2108205
10
reference_url https://security.archlinux.org/AVG-2782
reference_id AVG-2782
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2782
11
reference_url https://security.gentoo.org/glsa/202309-06
reference_id GLSA-202309-06
reference_type
scores
url https://security.gentoo.org/glsa/202309-06
12
reference_url https://usn.ubuntu.com/5542-1/
reference_id USN-5542-1
reference_type
scores
url https://usn.ubuntu.com/5542-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u5?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u5%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.16.4%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.16.4%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.16.4%252Bdfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
6
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2022-32744
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xwke-mduk-kyga
193
url VCID-xyfs-p969-syfp
vulnerability_id VCID-xyfs-p969-syfp
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19344.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19344.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19344
reference_id
reference_type
scores
0
value 0.02308
scoring_system epss
scoring_elements 0.84683
published_at 2026-04-01T12:55:00Z
1
value 0.02308
scoring_system epss
scoring_elements 0.84698
published_at 2026-04-02T12:55:00Z
2
value 0.02308
scoring_system epss
scoring_elements 0.84719
published_at 2026-04-04T12:55:00Z
3
value 0.02308
scoring_system epss
scoring_elements 0.8472
published_at 2026-04-07T12:55:00Z
4
value 0.02308
scoring_system epss
scoring_elements 0.84742
published_at 2026-04-08T12:55:00Z
5
value 0.02308
scoring_system epss
scoring_elements 0.84749
published_at 2026-04-09T12:55:00Z
6
value 0.02308
scoring_system epss
scoring_elements 0.84767
published_at 2026-04-11T12:55:00Z
7
value 0.02308
scoring_system epss
scoring_elements 0.84763
published_at 2026-04-12T12:55:00Z
8
value 0.02308
scoring_system epss
scoring_elements 0.84757
published_at 2026-04-13T12:55:00Z
9
value 0.02308
scoring_system epss
scoring_elements 0.84779
published_at 2026-04-16T12:55:00Z
10
value 0.02308
scoring_system epss
scoring_elements 0.8478
published_at 2026-04-18T12:55:00Z
11
value 0.02308
scoring_system epss
scoring_elements 0.84778
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19344
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19344
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1791204
reference_id 1791204
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1791204
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=950499
reference_id 950499
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=950499
6
reference_url https://security.gentoo.org/glsa/202003-52
reference_id GLSA-202003-52
reference_type
scores
url https://security.gentoo.org/glsa/202003-52
7
reference_url https://usn.ubuntu.com/4244-1/
reference_id USN-4244-1
reference_type
scores
url https://usn.ubuntu.com/4244-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.11.5%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.11.5%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.11.5%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2019-19344
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xyfs-p969-syfp
194
url VCID-ycau-9h17-quf3
vulnerability_id VCID-ycau-9h17-quf3
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which could lead to remote code execution.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00045.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00045.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10197.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10197.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-10197
reference_id
reference_type
scores
0
value 0.0479
scoring_system epss
scoring_elements 0.89441
published_at 2026-04-01T12:55:00Z
1
value 0.0479
scoring_system epss
scoring_elements 0.89491
published_at 2026-04-21T12:55:00Z
2
value 0.0479
scoring_system epss
scoring_elements 0.89486
published_at 2026-04-11T12:55:00Z
3
value 0.0479
scoring_system epss
scoring_elements 0.89484
published_at 2026-04-12T12:55:00Z
4
value 0.0479
scoring_system epss
scoring_elements 0.89479
published_at 2026-04-13T12:55:00Z
5
value 0.0479
scoring_system epss
scoring_elements 0.89493
published_at 2026-04-18T12:55:00Z
6
value 0.0479
scoring_system epss
scoring_elements 0.89445
published_at 2026-04-02T12:55:00Z
7
value 0.0479
scoring_system epss
scoring_elements 0.89455
published_at 2026-04-04T12:55:00Z
8
value 0.0479
scoring_system epss
scoring_elements 0.89457
published_at 2026-04-07T12:55:00Z
9
value 0.0479
scoring_system epss
scoring_elements 0.89473
published_at 2026-04-08T12:55:00Z
10
value 0.0479
scoring_system epss
scoring_elements 0.89477
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-10197
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10197
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10197
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10197
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/56ZUXHGDHPM7S6RVAKULZT5EATS37OKA/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/56ZUXHGDHPM7S6RVAKULZT5EATS37OKA/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7NYIUZOCIDXWXGWMZ7O5Z7OJ6IX7EAB/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7NYIUZOCIDXWXGWMZ7O5Z7OJ6IX7EAB/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z6EEKFT24DQI4DMZMSQTLMNZWG4RMZ57/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z6EEKFT24DQI4DMZMSQTLMNZWG4RMZ57/
9
reference_url https://seclists.org/bugtraq/2019/Sep/4
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Sep/4
10
reference_url https://security.netapp.com/advisory/ntap-20190903-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190903-0001/
11
reference_url https://support.f5.com/csp/article/K69511801
reference_id
reference_type
scores
url https://support.f5.com/csp/article/K69511801
12
reference_url https://support.f5.com/csp/article/K69511801?utm_source=f5support&amp%3Butm_medium=RSS
reference_id
reference_type
scores
url https://support.f5.com/csp/article/K69511801?utm_source=f5support&amp%3Butm_medium=RSS
13
reference_url https://www.debian.org/security/2019/dsa-4513
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4513
14
reference_url https://www.samba.org/samba/security/CVE-2019-10197.html
reference_id
reference_type
scores
url https://www.samba.org/samba/security/CVE-2019-10197.html
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1746225
reference_id 1746225
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1746225
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.10.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.10.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.10.0:rc1:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.10.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.10.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.10.0:rc2:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.10.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.10.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.10.0:rc3:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.10.0:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.10.0:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.10.0:rc4:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.11.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.11.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.11.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.11.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.11.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.11.0:rc1:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.11.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.11.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.11.0:rc2:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.11.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.11.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.11.0:rc3:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.9.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.9.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.9.0:rc1:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.9.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.9.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.9.0:rc2:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.9.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.9.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.9.0:rc3:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.9.0:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.9.0:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.9.0:rc4:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.9.0:rc5:*:*:*:*:*:*
reference_id cpe:2.3:a:samba:samba:4.9.0:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.9.0:rc5:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-10197
reference_id CVE-2019-10197
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:N
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
2
value 9.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-10197
33
reference_url https://security.gentoo.org/glsa/202003-52
reference_id GLSA-202003-52
reference_type
scores
url https://security.gentoo.org/glsa/202003-52
34
reference_url https://access.redhat.com/errata/RHSA-2019:3253
reference_id RHSA-2019:3253
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3253
35
reference_url https://access.redhat.com/errata/RHSA-2019:4023
reference_id RHSA-2019:4023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4023
36
reference_url https://access.redhat.com/errata/RHSA-2020:1084
reference_id RHSA-2020:1084
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1084
37
reference_url https://access.redhat.com/errata/RHSA-2020:1878
reference_id RHSA-2020:1878
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1878
38
reference_url https://usn.ubuntu.com/4121-1/
reference_id USN-4121-1
reference_type
scores
url https://usn.ubuntu.com/4121-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.9.13%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.9.13%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.13%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2019-10197
risk_score 4.1
exploitability 0.5
weighted_severity 8.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ycau-9h17-quf3
195
url VCID-ycdc-vg8w-6kew
vulnerability_id VCID-ycdc-vg8w-6kew
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which allowing a context-dependent attacker to bypass intended file
    restrictions, cause a Denial of Service or execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0239.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0239.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-0239
reference_id
reference_type
scores
0
value 0.22157
scoring_system epss
scoring_elements 0.95761
published_at 2026-04-01T12:55:00Z
1
value 0.22157
scoring_system epss
scoring_elements 0.9577
published_at 2026-04-02T12:55:00Z
2
value 0.22157
scoring_system epss
scoring_elements 0.95777
published_at 2026-04-04T12:55:00Z
3
value 0.22157
scoring_system epss
scoring_elements 0.9578
published_at 2026-04-07T12:55:00Z
4
value 0.22157
scoring_system epss
scoring_elements 0.95788
published_at 2026-04-08T12:55:00Z
5
value 0.22157
scoring_system epss
scoring_elements 0.95792
published_at 2026-04-09T12:55:00Z
6
value 0.22157
scoring_system epss
scoring_elements 0.95795
published_at 2026-04-12T12:55:00Z
7
value 0.22157
scoring_system epss
scoring_elements 0.95797
published_at 2026-04-13T12:55:00Z
8
value 0.22157
scoring_system epss
scoring_elements 0.95807
published_at 2026-04-16T12:55:00Z
9
value 0.22157
scoring_system epss
scoring_elements 0.95812
published_at 2026-04-18T12:55:00Z
10
value 0.22157
scoring_system epss
scoring_elements 0.95813
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-0239
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0239
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0239
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1101988
reference_id 1101988
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1101988
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=749845
reference_id 749845
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=749845
5
reference_url https://security.gentoo.org/glsa/201502-15
reference_id GLSA-201502-15
reference_type
scores
url https://security.gentoo.org/glsa/201502-15
6
reference_url https://usn.ubuntu.com/2257-1/
reference_id USN-2257-1
reference_type
scores
url https://usn.ubuntu.com/2257-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.1.8%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.1.8%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.1.8%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2014-0239
risk_score 0.1
exploitability 0.5
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ycdc-vg8w-6kew
196
url VCID-ycm6-j6gt-p7ar
vulnerability_id VCID-ycm6-j6gt-p7ar
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10918.json
reference_id
reference_type
scores
0
value 5.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10918.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-10918
reference_id
reference_type
scores
0
value 0.04257
scoring_system epss
scoring_elements 0.88761
published_at 2026-04-01T12:55:00Z
1
value 0.04257
scoring_system epss
scoring_elements 0.88769
published_at 2026-04-02T12:55:00Z
2
value 0.04257
scoring_system epss
scoring_elements 0.88785
published_at 2026-04-04T12:55:00Z
3
value 0.04257
scoring_system epss
scoring_elements 0.88787
published_at 2026-04-07T12:55:00Z
4
value 0.04257
scoring_system epss
scoring_elements 0.88804
published_at 2026-04-08T12:55:00Z
5
value 0.04257
scoring_system epss
scoring_elements 0.8881
published_at 2026-04-09T12:55:00Z
6
value 0.04257
scoring_system epss
scoring_elements 0.88822
published_at 2026-04-11T12:55:00Z
7
value 0.04257
scoring_system epss
scoring_elements 0.88816
published_at 2026-04-13T12:55:00Z
8
value 0.04257
scoring_system epss
scoring_elements 0.88831
published_at 2026-04-16T12:55:00Z
9
value 0.04257
scoring_system epss
scoring_elements 0.88829
published_at 2026-04-18T12:55:00Z
10
value 0.04257
scoring_system epss
scoring_elements 0.88826
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-10918
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10918
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1610640
reference_id 1610640
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1610640
5
reference_url https://security.gentoo.org/glsa/202003-52
reference_id GLSA-202003-52
reference_type
scores
url https://security.gentoo.org/glsa/202003-52
6
reference_url https://usn.ubuntu.com/3738-1/
reference_id USN-3738-1
reference_type
scores
url https://usn.ubuntu.com/3738-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.8.4%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.8.4%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.8.4%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2018-10918
risk_score 2.4
exploitability 0.5
weighted_severity 4.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ycm6-j6gt-p7ar
197
url VCID-yqzv-hn4u-aued
vulnerability_id VCID-yqzv-hn4u-aued
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0600.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0600.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0600
reference_id
reference_type
scores
0
value 0.59614
scoring_system epss
scoring_elements 0.98238
published_at 2026-04-01T12:55:00Z
1
value 0.59614
scoring_system epss
scoring_elements 0.98241
published_at 2026-04-02T12:55:00Z
2
value 0.59614
scoring_system epss
scoring_elements 0.98244
published_at 2026-04-07T12:55:00Z
3
value 0.59614
scoring_system epss
scoring_elements 0.98249
published_at 2026-04-09T12:55:00Z
4
value 0.59614
scoring_system epss
scoring_elements 0.98253
published_at 2026-04-13T12:55:00Z
5
value 0.59614
scoring_system epss
scoring_elements 0.98259
published_at 2026-04-21T12:55:00Z
6
value 0.59614
scoring_system epss
scoring_elements 0.9826
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0600
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0600
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617238
reference_id 1617238
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617238
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=260838
reference_id 260838
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=260838
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/364.pl
reference_id OSVDB-8190;CVE-2004-0600
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/364.pl
6
reference_url https://access.redhat.com/errata/RHSA-2004:259
reference_id RHSA-2004:259
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:259
fixed_packages
0
url pkg:deb/debian/samba@3.0.5?distro=trixie
purl pkg:deb/debian/samba@3.0.5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@3.0.5%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2004-0600
risk_score 1.0
exploitability 2.0
weighted_severity 0.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yqzv-hn4u-aued
198
url VCID-zj82-mcs7-sbej
vulnerability_id VCID-zj82-mcs7-sbej
summary samba: smbd doesn't pick up group membership changes when re-authenticating an expired SMB session
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0620.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0620.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-0620
reference_id
reference_type
scores
0
value 0.0025
scoring_system epss
scoring_elements 0.48243
published_at 2026-04-21T12:55:00Z
1
value 0.00576
scoring_system epss
scoring_elements 0.68722
published_at 2026-04-02T12:55:00Z
2
value 0.00576
scoring_system epss
scoring_elements 0.68791
published_at 2026-04-09T12:55:00Z
3
value 0.00576
scoring_system epss
scoring_elements 0.68813
published_at 2026-04-11T12:55:00Z
4
value 0.00576
scoring_system epss
scoring_elements 0.68799
published_at 2026-04-12T12:55:00Z
5
value 0.00576
scoring_system epss
scoring_elements 0.6877
published_at 2026-04-13T12:55:00Z
6
value 0.00576
scoring_system epss
scoring_elements 0.68811
published_at 2026-04-16T12:55:00Z
7
value 0.00576
scoring_system epss
scoring_elements 0.68822
published_at 2026-04-18T12:55:00Z
8
value 0.00576
scoring_system epss
scoring_elements 0.68742
published_at 2026-04-04T12:55:00Z
9
value 0.00576
scoring_system epss
scoring_elements 0.6872
published_at 2026-04-07T12:55:00Z
10
value 0.00576
scoring_system epss
scoring_elements 0.68771
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-0620
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107248
reference_id 1107248
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107248
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2370453
reference_id 2370453
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T20:43:04Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2370453
5
reference_url https://security.archlinux.org/ASA-202506-3
reference_id ASA-202506-3
reference_type
scores
url https://security.archlinux.org/ASA-202506-3
6
reference_url https://security.archlinux.org/AVG-2892
reference_id AVG-2892
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2892
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
13
reference_url https://access.redhat.com/security/cve/CVE-2025-0620
reference_id CVE-2025-0620
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T20:43:04Z/
url https://access.redhat.com/security/cve/CVE-2025-0620
14
reference_url https://www.samba.org/samba/security/CVE-2025-0620.html
reference_id CVE-2025-0620.html
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T20:43:04Z/
url https://www.samba.org/samba/security/CVE-2025-0620.html
15
reference_url https://usn.ubuntu.com/7564-1/
reference_id USN-7564-1
reference_type
scores
url https://usn.ubuntu.com/7564-1/
fixed_packages
0
url pkg:deb/debian/samba@0?distro=trixie
purl pkg:deb/debian/samba@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@0%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.2%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
6
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2025-0620
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zj82-mcs7-sbej
199
url VCID-zrfg-a5m3-jkf3
vulnerability_id VCID-zrfg-a5m3-jkf3
summary samba: fd_open_atomic infinite loop due to wrong handling of dangling symlinks
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9461.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9461.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9461
reference_id
reference_type
scores
0
value 0.03382
scoring_system epss
scoring_elements 0.87336
published_at 2026-04-01T12:55:00Z
1
value 0.03382
scoring_system epss
scoring_elements 0.87346
published_at 2026-04-02T12:55:00Z
2
value 0.03382
scoring_system epss
scoring_elements 0.87361
published_at 2026-04-07T12:55:00Z
3
value 0.03382
scoring_system epss
scoring_elements 0.87379
published_at 2026-04-08T12:55:00Z
4
value 0.03382
scoring_system epss
scoring_elements 0.87386
published_at 2026-04-09T12:55:00Z
5
value 0.03382
scoring_system epss
scoring_elements 0.87398
published_at 2026-04-11T12:55:00Z
6
value 0.03382
scoring_system epss
scoring_elements 0.87393
published_at 2026-04-12T12:55:00Z
7
value 0.03382
scoring_system epss
scoring_elements 0.87389
published_at 2026-04-13T12:55:00Z
8
value 0.03382
scoring_system epss
scoring_elements 0.87403
published_at 2026-04-16T12:55:00Z
9
value 0.03382
scoring_system epss
scoring_elements 0.87406
published_at 2026-04-18T12:55:00Z
10
value 0.03382
scoring_system epss
scoring_elements 0.87401
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9461
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9461
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1459464
reference_id 1459464
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1459464
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864291
reference_id 864291
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864291
5
reference_url https://access.redhat.com/errata/RHSA-2017:1950
reference_id RHSA-2017:1950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1950
6
reference_url https://access.redhat.com/errata/RHSA-2017:2338
reference_id RHSA-2017:2338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2338
7
reference_url https://access.redhat.com/errata/RHSA-2017:2778
reference_id RHSA-2017:2778
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2778
8
reference_url https://usn.ubuntu.com/3348-1/
reference_id USN-3348-1
reference_type
scores
url https://usn.ubuntu.com/3348-1/
fixed_packages
0
url pkg:deb/debian/samba@2:4.5.6%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.5.6%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.5.6%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2017-9461
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zrfg-a5m3-jkf3
200
url VCID-zs35-bjp9-z3hj
vulnerability_id VCID-zs35-bjp9-z3hj
summary samba: DoS (smbd crash) due memory leak in management of fds for socket connections
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0817.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0817.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0817
reference_id
reference_type
scores
0
value 0.07502
scoring_system epss
scoring_elements 0.91756
published_at 2026-04-01T12:55:00Z
1
value 0.07502
scoring_system epss
scoring_elements 0.91765
published_at 2026-04-02T12:55:00Z
2
value 0.07502
scoring_system epss
scoring_elements 0.91771
published_at 2026-04-04T12:55:00Z
3
value 0.07502
scoring_system epss
scoring_elements 0.91779
published_at 2026-04-07T12:55:00Z
4
value 0.07502
scoring_system epss
scoring_elements 0.91791
published_at 2026-04-08T12:55:00Z
5
value 0.07502
scoring_system epss
scoring_elements 0.91798
published_at 2026-04-13T12:55:00Z
6
value 0.07502
scoring_system epss
scoring_elements 0.91801
published_at 2026-04-11T12:55:00Z
7
value 0.07502
scoring_system epss
scoring_elements 0.91803
published_at 2026-04-12T12:55:00Z
8
value 0.07502
scoring_system epss
scoring_elements 0.91818
published_at 2026-04-16T12:55:00Z
9
value 0.07502
scoring_system epss
scoring_elements 0.9181
published_at 2026-04-18T12:55:00Z
10
value 0.07502
scoring_system epss
scoring_elements 0.91811
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0817
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0817
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=785746
reference_id 785746
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=785746
fixed_packages
0
url pkg:deb/debian/samba@2:3.6.3-1?distro=trixie
purl pkg:deb/debian/samba@2:3.6.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:3.6.3-1%3Fdistro=trixie
1
url pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
purl pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18xs-py1v-xfey
1
vulnerability VCID-28rq-1d68-4bfz
2
vulnerability VCID-2w26-yjmn-k7an
3
vulnerability VCID-3du2-evy8-jfa1
4
vulnerability VCID-5cd3-497h-qkhw
5
vulnerability VCID-68zz-z589-87f6
6
vulnerability VCID-6mju-nwzy-pqeq
7
vulnerability VCID-7xdg-sn88-bkbs
8
vulnerability VCID-84q8-2457-qkc5
9
vulnerability VCID-94k8-98me-x3dw
10
vulnerability VCID-apqw-e2px-yka5
11
vulnerability VCID-b4ty-d775-5fed
12
vulnerability VCID-bc1t-hzu5-bffd
13
vulnerability VCID-bpht-9daq-rfgd
14
vulnerability VCID-fskg-j9fe-6yeg
15
vulnerability VCID-hfsk-4cbd-m3b1
16
vulnerability VCID-kkwp-2x9m-9bgd
17
vulnerability VCID-q2d9-vahb-6qce
18
vulnerability VCID-r7va-6j6s-rba5
19
vulnerability VCID-w4c6-p858-rkaw
20
vulnerability VCID-wxva-f9ay-c3a2
21
vulnerability VCID-xmn1-g72k-8qcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie
2
url pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-0817
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zs35-bjp9-z3hj
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie