Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/1036930?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/1036930?format=api", "purl": "pkg:deb/debian/samba@2:4.5.16%2Bdfsg-1%2Bdeb9u2", "type": "deb", "namespace": "debian", "name": "samba", "version": "2:4.5.16+dfsg-1+deb9u2", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "2:4.17.12+dfsg-0+deb12u2", "latest_non_vulnerable_version": "2:4.17.12+dfsg-0+deb12u2", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47961?format=api", "vulnerability_id": "VCID-21hz-xvek-73cd", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16860.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16860.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16860", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83706", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83719", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83734", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83736", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.8376", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83767", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83783", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83777", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83772", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83806", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83807", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83808", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83833", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83841", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83846", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83868", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83889", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83905", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16860" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16860", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16860" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705877", "reference_id": "1705877", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705877" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928966", "reference_id": "928966", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928966" }, { "reference_url": "https://security.gentoo.org/glsa/202003-52", "reference_id": "GLSA-202003-52", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-52" }, { "reference_url": "https://usn.ubuntu.com/3976-1/", "reference_id": "USN-3976-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3976-1/" }, { "reference_url": "https://usn.ubuntu.com/3976-2/", "reference_id": "USN-3976-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3976-2/" }, { "reference_url": "https://usn.ubuntu.com/5675-1/", "reference_id": "USN-5675-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5675-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038160?format=api", "purl": "pkg:deb/debian/samba@2:4.9.5%2Bdfsg-5%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-5%252Bdeb10u3" } ], "aliases": [ "CVE-2018-16860" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-21hz-xvek-73cd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63875?format=api", "vulnerability_id": "VCID-29k5-64fs-ufcd", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12150.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12150.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12150", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.19902", "scoring_system": "epss", "scoring_elements": "0.95421", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.19902", "scoring_system": "epss", "scoring_elements": "0.95499", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.19902", "scoring_system": "epss", "scoring_elements": "0.95485", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.19902", "scoring_system": "epss", "scoring_elements": "0.95492", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.19902", "scoring_system": "epss", "scoring_elements": "0.95429", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.19902", "scoring_system": "epss", "scoring_elements": "0.95436", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.19902", "scoring_system": "epss", "scoring_elements": "0.95439", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.19902", "scoring_system": "epss", "scoring_elements": "0.95446", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.19902", "scoring_system": "epss", "scoring_elements": "0.95448", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.19902", "scoring_system": "epss", "scoring_elements": "0.95453", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.19902", "scoring_system": "epss", "scoring_elements": "0.95454", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.19902", "scoring_system": "epss", "scoring_elements": "0.95463", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.19902", "scoring_system": "epss", "scoring_elements": "0.95468", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.19902", "scoring_system": "epss", "scoring_elements": "0.95472", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.19902", "scoring_system": "epss", "scoring_elements": "0.95473", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.19902", "scoring_system": "epss", "scoring_elements": "0.95475", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12150" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12150", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12150" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12151", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12151" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12163", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12163" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:H/Au:N/C:C/I:C/A:N" }, { "value": "8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1488400", "reference_id": "1488400", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1488400" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2789", "reference_id": "RHSA-2017:2789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2790", "reference_id": "RHSA-2017:2790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2791", "reference_id": "RHSA-2017:2791", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2791" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2858", "reference_id": "RHSA-2017:2858", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2858" }, { "reference_url": "https://usn.ubuntu.com/3426-1/", "reference_id": "USN-3426-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3426-1/" }, { "reference_url": "https://usn.ubuntu.com/3426-2/", "reference_id": "USN-3426-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3426-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038160?format=api", "purl": "pkg:deb/debian/samba@2:4.9.5%2Bdfsg-5%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-5%252Bdeb10u3" } ], "aliases": [ "CVE-2017-12150" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-29k5-64fs-ufcd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/44838?format=api", "vulnerability_id": "VCID-2dm7-xt4e-wkex", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14303.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14303.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14303", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.26364", "scoring_system": "epss", "scoring_elements": "0.96273", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.26364", "scoring_system": "epss", "scoring_elements": "0.9635", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.26364", "scoring_system": "epss", "scoring_elements": "0.96339", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.26364", "scoring_system": "epss", "scoring_elements": "0.96345", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.26364", "scoring_system": "epss", "scoring_elements": "0.96281", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.26364", "scoring_system": "epss", "scoring_elements": "0.96289", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.26364", "scoring_system": "epss", "scoring_elements": "0.96293", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.26364", "scoring_system": "epss", "scoring_elements": "0.96302", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.26364", "scoring_system": "epss", "scoring_elements": "0.96305", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.26364", "scoring_system": "epss", "scoring_elements": "0.96309", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.26364", "scoring_system": "epss", "scoring_elements": "0.96312", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.26364", "scoring_system": "epss", "scoring_elements": "0.96321", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.26364", "scoring_system": "epss", "scoring_elements": "0.96325", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.26364", "scoring_system": "epss", "scoring_elements": "0.96327", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.26364", "scoring_system": "epss", "scoring_elements": "0.96329", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.26364", "scoring_system": "epss", "scoring_elements": "0.9633", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14303" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14303", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14303" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1851298", "reference_id": "1851298", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1851298" }, { "reference_url": "https://security.archlinux.org/AVG-1202", "reference_id": "AVG-1202", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1202" }, { "reference_url": "https://security.gentoo.org/glsa/202007-15", "reference_id": "GLSA-202007-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202007-15" }, { "reference_url": "https://usn.ubuntu.com/4454-1/", "reference_id": "USN-4454-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4454-1/" }, { "reference_url": "https://usn.ubuntu.com/4454-2/", "reference_id": "USN-4454-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4454-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6" } ], "aliases": [ "CVE-2020-14303" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2dm7-xt4e-wkex" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47963?format=api", "vulnerability_id": "VCID-2gkd-vubu-j7fd", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14861.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14861.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14861", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04997", "scoring_system": "epss", "scoring_elements": "0.89771", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.04997", "scoring_system": "epss", "scoring_elements": "0.89663", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04997", "scoring_system": "epss", "scoring_elements": "0.89666", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04997", "scoring_system": "epss", "scoring_elements": "0.8968", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04997", "scoring_system": "epss", "scoring_elements": "0.89683", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04997", "scoring_system": "epss", "scoring_elements": "0.897", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04997", "scoring_system": "epss", "scoring_elements": "0.89706", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04997", "scoring_system": "epss", "scoring_elements": "0.89713", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04997", "scoring_system": "epss", "scoring_elements": "0.89712", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04997", "scoring_system": "epss", "scoring_elements": "0.89705", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04997", "scoring_system": "epss", "scoring_elements": "0.89721", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04997", "scoring_system": "epss", "scoring_elements": "0.89722", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04997", "scoring_system": "epss", "scoring_elements": "0.89717", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04997", "scoring_system": "epss", "scoring_elements": "0.89732", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.04997", "scoring_system": "epss", "scoring_elements": "0.89734", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.04997", "scoring_system": "epss", "scoring_elements": "0.89733", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.04997", "scoring_system": "epss", "scoring_elements": "0.89744", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.04997", "scoring_system": "epss", "scoring_elements": "0.89759", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14861" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14861", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14861" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778586", "reference_id": "1778586", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778586" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/06/24/3", "reference_id": "3", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/06/24/3" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2019-14861.html", "reference_id": "CVE-2019-14861.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/" } ], "url": "https://www.samba.org/samba/security/CVE-2019-14861.html" }, { "reference_url": "https://security.gentoo.org/glsa/202003-52", "reference_id": "GLSA-202003-52", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/" } ], "url": "https://security.gentoo.org/glsa/202003-52" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00038.html", "reference_id": "msg00038.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00038.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20191210-0002/", "reference_id": "ntap-20191210-0002", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20191210-0002/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PJH3ROOFYMOATD2UEPC47P5RPBDTY77E/", "reference_id": "PJH3ROOFYMOATD2UEPC47P5RPBDTY77E", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PJH3ROOFYMOATD2UEPC47P5RPBDTY77E/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14861", "reference_id": "show_bug.cgi?id=CVE-2019-14861", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14861" }, { "reference_url": "https://www.synology.com/security/advisory/Synology_SA_19_40", "reference_id": "Synology_SA_19_40", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/" } ], "url": "https://www.synology.com/security/advisory/Synology_SA_19_40" }, { "reference_url": "https://usn.ubuntu.com/4217-1/", "reference_id": "USN-4217-1", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/" } ], "url": "https://usn.ubuntu.com/4217-1/" }, { "reference_url": "https://usn.ubuntu.com/4217-2/", "reference_id": "USN-4217-2", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/" } ], "url": "https://usn.ubuntu.com/4217-2/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNKA4YIPV7AZR7KK3GW6L3HKGHSGJZFE/", "reference_id": "WNKA4YIPV7AZR7KK3GW6L3HKGHSGJZFE", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNKA4YIPV7AZR7KK3GW6L3HKGHSGJZFE/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6" } ], "aliases": [ "CVE-2019-14861" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2gkd-vubu-j7fd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47954?format=api", "vulnerability_id": "VCID-2ks6-vhre-6ke2", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1140.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1140.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1140", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.14503", "scoring_system": "epss", "scoring_elements": "0.94413", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.14503", "scoring_system": "epss", "scoring_elements": "0.9442", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.14503", "scoring_system": "epss", "scoring_elements": "0.94431", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.14503", "scoring_system": "epss", "scoring_elements": "0.94433", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.14503", "scoring_system": "epss", "scoring_elements": "0.94443", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.14503", "scoring_system": "epss", "scoring_elements": "0.94446", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.14503", "scoring_system": "epss", "scoring_elements": "0.94449", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.14503", "scoring_system": "epss", "scoring_elements": "0.94451", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.14503", "scoring_system": "epss", "scoring_elements": "0.94465", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.14503", "scoring_system": "epss", "scoring_elements": "0.9447", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.14503", "scoring_system": "epss", "scoring_elements": "0.94473", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.14503", "scoring_system": "epss", "scoring_elements": "0.94474", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.14503", "scoring_system": "epss", "scoring_elements": "0.94472", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.14503", "scoring_system": "epss", "scoring_elements": "0.94478", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.14503", "scoring_system": "epss", "scoring_elements": "0.94485", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.14503", "scoring_system": "epss", "scoring_elements": "0.94496", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1140" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1140", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1140" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1580230", "reference_id": "1580230", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1580230" }, { "reference_url": "https://security.gentoo.org/glsa/202003-52", "reference_id": "GLSA-202003-52", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-52" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038160?format=api", "purl": "pkg:deb/debian/samba@2:4.9.5%2Bdfsg-5%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-5%252Bdeb10u3" } ], "aliases": [ "CVE-2018-1140" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2ks6-vhre-6ke2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48483?format=api", "vulnerability_id": "VCID-47k4-8k1s-zff2", "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23192.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23192.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23192", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28224", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28652", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28604", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.2849", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28378", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28302", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28143", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28201", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.31088", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.31044", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30999", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.3103", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.31002", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.31052", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.31081", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.31128", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.31176", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30996", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23192" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019666", "reference_id": "2019666", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019666" }, { "reference_url": "https://security.archlinux.org/AVG-2538", "reference_id": "AVG-2538", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2538" }, { "reference_url": "https://security.gentoo.org/glsa/202309-06", "reference_id": "GLSA-202309-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202309-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4843", "reference_id": "RHSA-2021:4843", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4843" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5082", "reference_id": "RHSA-2021:5082", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5082" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0008", "reference_id": "RHSA-2022:0008", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0008" }, { "reference_url": "https://usn.ubuntu.com/5142-1/", "reference_id": "USN-5142-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5142-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6" } ], "aliases": [ "CVE-2021-23192" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-47k4-8k1s-zff2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81895?format=api", "vulnerability_id": "VCID-4qm6-a9un-nyda", "summary": "samba: samba AD DC LDAP denial of service via dirsync", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14847.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14847.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14847", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02434", "scoring_system": "epss", "scoring_elements": "0.8509", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02434", "scoring_system": "epss", "scoring_elements": "0.85271", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.02434", "scoring_system": "epss", "scoring_elements": "0.85205", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02434", "scoring_system": "epss", "scoring_elements": "0.85214", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02434", "scoring_system": "epss", "scoring_elements": "0.85212", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02434", "scoring_system": "epss", "scoring_elements": "0.85226", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.02434", "scoring_system": "epss", "scoring_elements": "0.85252", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.02434", "scoring_system": "epss", "scoring_elements": "0.85103", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02434", "scoring_system": "epss", "scoring_elements": "0.8512", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02434", "scoring_system": "epss", "scoring_elements": "0.85124", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02434", "scoring_system": "epss", "scoring_elements": "0.85145", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02434", "scoring_system": "epss", "scoring_elements": "0.85152", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02434", "scoring_system": "epss", "scoring_elements": "0.85167", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02434", "scoring_system": "epss", "scoring_elements": "0.85164", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02434", "scoring_system": "epss", "scoring_elements": "0.85161", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02434", "scoring_system": "epss", "scoring_elements": "0.85182", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02434", "scoring_system": "epss", "scoring_elements": "0.85183", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14847" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14847", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14847" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14847", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14847" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKPYHDFI7HRELVXBE5J4MTGSI35AKFBI/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKPYHDFI7HRELVXBE5J4MTGSI35AKFBI/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3IUACPZJXSC4OM6P2V4IC4QMZQZWPD/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3IUACPZJXSC4OM6P2V4IC4QMZQZWPD/" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2019-14847.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.samba.org/samba/security/CVE-2019-14847.html" }, { "reference_url": "https://www.synology.com/security/advisory/Synology_SA_19_35", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.synology.com/security/advisory/Synology_SA_19_35" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764142", "reference_id": "1764142", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764142" }, { "reference_url": "https://security.archlinux.org/ASA-201911-6", "reference_id": "ASA-201911-6", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201911-6" }, { "reference_url": "https://security.archlinux.org/AVG-1057", "reference_id": "AVG-1057", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1057" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14847", "reference_id": "CVE-2019-14847", "reference_type": "", "scores": [ { "value": "4.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P" }, { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14847" }, { "reference_url": "https://usn.ubuntu.com/4167-1/", "reference_id": "USN-4167-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4167-1/" }, { "reference_url": "https://usn.ubuntu.com/4167-2/", "reference_id": "USN-4167-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4167-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6" } ], "aliases": [ "CVE-2019-14847" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4qm6-a9un-nyda" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47966?format=api", "vulnerability_id": "VCID-55zj-6b4s-8ker", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14902.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14902.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14902", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03503", "scoring_system": "epss", "scoring_elements": "0.87558", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03503", "scoring_system": "epss", "scoring_elements": "0.87567", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03503", "scoring_system": "epss", "scoring_elements": "0.87581", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03503", "scoring_system": "epss", "scoring_elements": "0.87583", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03503", "scoring_system": "epss", "scoring_elements": "0.87602", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03503", "scoring_system": "epss", "scoring_elements": "0.87609", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03503", "scoring_system": "epss", "scoring_elements": "0.8762", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03503", "scoring_system": "epss", "scoring_elements": "0.87615", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03503", "scoring_system": "epss", "scoring_elements": "0.87612", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03503", "scoring_system": "epss", "scoring_elements": "0.87627", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03503", "scoring_system": "epss", "scoring_elements": "0.87628", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03503", "scoring_system": "epss", "scoring_elements": "0.87625", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03503", "scoring_system": "epss", "scoring_elements": "0.87643", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03503", "scoring_system": "epss", "scoring_elements": "0.8765", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.03503", "scoring_system": "epss", "scoring_elements": "0.87648", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.03503", "scoring_system": "epss", "scoring_elements": "0.87663", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.03503", "scoring_system": "epss", "scoring_elements": "0.87678", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.03503", "scoring_system": "epss", "scoring_elements": "0.87696", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14902" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14902", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14902" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1791201", "reference_id": "1791201", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1791201" }, { "reference_url": "https://security.gentoo.org/glsa/202003-52", "reference_id": "GLSA-202003-52", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-52" }, { "reference_url": "https://usn.ubuntu.com/4244-1/", "reference_id": "USN-4244-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4244-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6" } ], "aliases": [ "CVE-2019-14902" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "4.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-55zj-6b4s-8ker" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63877?format=api", "vulnerability_id": "VCID-5kvv-rbas-tbh9", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12163.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12163.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12163", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.41375", "scoring_system": "epss", "scoring_elements": "0.97375", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.41375", "scoring_system": "epss", "scoring_elements": "0.97427", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.41375", "scoring_system": "epss", "scoring_elements": "0.9742", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.41375", "scoring_system": "epss", "scoring_elements": "0.97423", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.41375", "scoring_system": "epss", "scoring_elements": "0.97382", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.41375", "scoring_system": "epss", "scoring_elements": "0.97386", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.41375", "scoring_system": "epss", "scoring_elements": "0.97387", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.41375", "scoring_system": "epss", "scoring_elements": "0.97394", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.41375", "scoring_system": "epss", "scoring_elements": "0.97395", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.41375", "scoring_system": "epss", "scoring_elements": "0.97397", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.41375", "scoring_system": "epss", "scoring_elements": "0.97398", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.41375", "scoring_system": "epss", "scoring_elements": "0.97406", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.41375", "scoring_system": "epss", "scoring_elements": "0.97409", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.41375", "scoring_system": "epss", "scoring_elements": "0.9741", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.41375", "scoring_system": "epss", "scoring_elements": "0.97412", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.41375", "scoring_system": "epss", "scoring_elements": "0.97415", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12163" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12150", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12150" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12151", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12151" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12163", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12163" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:P/I:N/A:N" }, { "value": "5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1491206", "reference_id": "1491206", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1491206" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2789", "reference_id": "RHSA-2017:2789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2790", "reference_id": "RHSA-2017:2790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2791", "reference_id": "RHSA-2017:2791", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2791" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2858", "reference_id": "RHSA-2017:2858", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2858" }, { "reference_url": "https://usn.ubuntu.com/3426-1/", "reference_id": "USN-3426-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3426-1/" }, { "reference_url": "https://usn.ubuntu.com/3426-2/", "reference_id": "USN-3426-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3426-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038160?format=api", "purl": "pkg:deb/debian/samba@2:4.9.5%2Bdfsg-5%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-5%252Bdeb10u3" } ], "aliases": [ "CVE-2017-12163" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5kvv-rbas-tbh9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48475?format=api", "vulnerability_id": "VCID-5vyg-1jzr-ebh8", "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25718.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25718.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25718", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.4183", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41537", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41452", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41521", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41895", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41923", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41755", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41805", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41815", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41838", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41806", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41793", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41842", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41743", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.4167", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41671", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41592", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25718" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019726", "reference_id": "2019726", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019726" }, { "reference_url": "https://security.archlinux.org/AVG-2538", "reference_id": "AVG-2538", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2538" }, { "reference_url": "https://security.gentoo.org/glsa/202309-06", "reference_id": "GLSA-202309-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202309-06" }, { "reference_url": "https://usn.ubuntu.com/5142-1/", "reference_id": "USN-5142-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5142-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6" } ], "aliases": [ "CVE-2020-25718" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5vyg-1jzr-ebh8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66871?format=api", "vulnerability_id": "VCID-745n-wca7-d7fh", "summary": "samba: vfs_streams_xattr uninitialized memory write possible", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-9640.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-9640.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-9640", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.228", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23062", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22752", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22747", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.2274", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.2264", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22725", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23106", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22898", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.2297", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23023", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23042", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23004", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22949", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22965", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22958", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22922", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-9640" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9640", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9640" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2391698", "reference_id": "2391698", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-15T13:06:54Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2391698" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4", "reference_id": "cpe:/a:redhat:openshift:4", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10", "reference_id": "cpe:/o:redhat:enterprise_linux:10", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7", "reference_id": "cpe:/o:redhat:enterprise_linux:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8", "reference_id": "cpe:/o:redhat:enterprise_linux:8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9", "reference_id": "cpe:/o:redhat:enterprise_linux:9", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2025-9640", "reference_id": "CVE-2025-9640", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-15T13:06:54Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2025-9640" }, { "reference_url": "https://www.samba.org/samba/history/security.html", "reference_id": "security.html", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-15T13:06:54Z/" } ], "url": "https://www.samba.org/samba/history/security.html" }, { "reference_url": "https://usn.ubuntu.com/7826-1/", "reference_id": "USN-7826-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7826-1/" }, { "reference_url": "https://usn.ubuntu.com/7826-2/", "reference_id": "USN-7826-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7826-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994568?format=api", "purl": "pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u2" } ], "aliases": [ "CVE-2025-9640" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-745n-wca7-d7fh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47171?format=api", "vulnerability_id": "VCID-76sz-d2yt-buek", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14383.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14383.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14383", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00465", "scoring_system": "epss", "scoring_elements": "0.64258", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00465", "scoring_system": "epss", "scoring_elements": "0.64316", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00465", "scoring_system": "epss", "scoring_elements": "0.64472", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00465", "scoring_system": "epss", "scoring_elements": "0.64375", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00465", "scoring_system": "epss", "scoring_elements": "0.64395", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00465", "scoring_system": "epss", "scoring_elements": "0.64408", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00465", "scoring_system": "epss", "scoring_elements": "0.64382", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00465", "scoring_system": "epss", "scoring_elements": "0.64427", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00465", "scoring_system": "epss", "scoring_elements": "0.64344", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00465", "scoring_system": "epss", "scoring_elements": "0.64301", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00465", "scoring_system": "epss", "scoring_elements": "0.64349", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00465", "scoring_system": "epss", "scoring_elements": "0.64364", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00465", "scoring_system": "epss", "scoring_elements": "0.64377", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00465", "scoring_system": "epss", "scoring_elements": "0.64365", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00465", "scoring_system": "epss", "scoring_elements": "0.64336", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00465", "scoring_system": "epss", "scoring_elements": "0.64372", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00465", "scoring_system": "epss", "scoring_elements": "0.64383", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14383" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14383" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892636", "reference_id": "1892636", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T15:10:17Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892636" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973398", "reference_id": "973398", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973398" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2020-14383.html", "reference_id": "CVE-2020-14383.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T15:10:17Z/" } ], "url": "https://www.samba.org/samba/security/CVE-2020-14383.html" }, { "reference_url": "https://security.gentoo.org/glsa/202012-24", "reference_id": "GLSA-202012-24", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T15:10:17Z/" } ], "url": "https://security.gentoo.org/glsa/202012-24" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html", "reference_id": "msg00015.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T15:10:17Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html" }, { "reference_url": "https://usn.ubuntu.com/4611-1/", "reference_id": "USN-4611-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4611-1/" }, { "reference_url": "https://usn.ubuntu.com/4931-1/", "reference_id": "USN-4931-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4931-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6" } ], "aliases": [ "CVE-2020-14383" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-76sz-d2yt-buek" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48485?format=api", "vulnerability_id": "VCID-7bb1-3ny6-rbbv", "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44142.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44142.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-44142", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.30651", "scoring_system": "epss", "scoring_elements": "0.96687", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.30651", "scoring_system": "epss", "scoring_elements": "0.96699", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.30651", "scoring_system": "epss", "scoring_elements": "0.96697", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.32269", "scoring_system": "epss", "scoring_elements": "0.96823", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.32269", "scoring_system": "epss", "scoring_elements": "0.96831", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.35695", "scoring_system": "epss", "scoring_elements": "0.97104", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.35695", "scoring_system": "epss", "scoring_elements": "0.97094", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.35695", "scoring_system": "epss", "scoring_elements": "0.97097", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.37405", "scoring_system": "epss", "scoring_elements": "0.9718", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.37405", "scoring_system": "epss", "scoring_elements": "0.97175", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.37405", "scoring_system": "epss", "scoring_elements": "0.97179", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.37405", "scoring_system": "epss", "scoring_elements": "0.97181", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.37405", "scoring_system": "epss", "scoring_elements": "0.97198", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.37405", "scoring_system": "epss", "scoring_elements": "0.97197", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.37405", "scoring_system": "epss", "scoring_elements": "0.97195", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.37405", "scoring_system": "epss", "scoring_elements": "0.97191", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.37405", "scoring_system": "epss", "scoring_elements": "0.97188", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-44142" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44142", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44142" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004693", "reference_id": "1004693", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004693" }, { "reference_url": "https://kb.cert.org/vuls/id/119678", "reference_id": "119678", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:30:59Z/" } ], "url": "https://kb.cert.org/vuls/id/119678" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046146", "reference_id": "2046146", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046146" }, { "reference_url": "https://security.archlinux.org/AVG-2648", "reference_id": "AVG-2648", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2648" }, { "reference_url": "https://www.zerodayinitiative.com/blog/2022/2/1/cve-2021-44142-details-on-a-samba-code-execution-bug-demonstrated-at-pwn2own-austin", "reference_id": "cve-2021-44142-details-on-a-samba-code-execution-bug-demonstrated-at-pwn2own-austin", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:30:59Z/" } ], "url": "https://www.zerodayinitiative.com/blog/2022/2/1/cve-2021-44142-details-on-a-samba-code-execution-bug-demonstrated-at-pwn2own-austin" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2021-44142.html", "reference_id": "CVE-2021-44142.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:30:59Z/" } ], "url": "https://www.samba.org/samba/security/CVE-2021-44142.html" }, { "reference_url": "https://security.gentoo.org/glsa/202309-06", "reference_id": "GLSA-202309-06", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:30:59Z/" } ], "url": "https://security.gentoo.org/glsa/202309-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0328", "reference_id": "RHSA-2022:0328", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0328" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0329", "reference_id": "RHSA-2022:0329", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0329" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0330", "reference_id": "RHSA-2022:0330", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0330" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0331", "reference_id": "RHSA-2022:0331", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0331" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0332", "reference_id": "RHSA-2022:0332", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0332" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0457", "reference_id": "RHSA-2022:0457", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0457" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0458", "reference_id": "RHSA-2022:0458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0663", "reference_id": "RHSA-2022:0663", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0663" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0664", "reference_id": "RHSA-2022:0664", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0664" }, { "reference_url": "https://bugzilla.samba.org/show_bug.cgi?id=14914", "reference_id": "show_bug.cgi?id=14914", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:30:59Z/" } ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=14914" }, { "reference_url": "https://usn.ubuntu.com/5260-1/", "reference_id": "USN-5260-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5260-1/" }, { "reference_url": "https://usn.ubuntu.com/5260-2/", "reference_id": "USN-5260-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5260-2/" }, { "reference_url": "https://usn.ubuntu.com/5260-3/", "reference_id": "USN-5260-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5260-3/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038160?format=api", "purl": "pkg:deb/debian/samba@2:4.9.5%2Bdfsg-5%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-5%252Bdeb10u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6" } ], "aliases": [ "CVE-2021-44142" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7bb1-3ny6-rbbv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47170?format=api", "vulnerability_id": "VCID-88mw-c7mc-jugp", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14323.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14323.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14323", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62132", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.6191", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.61983", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62015", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.61985", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62034", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62051", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62072", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62061", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.6204", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62082", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62088", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.6207", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62067", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62084", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62077", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62023", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14323" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891685", "reference_id": "1891685", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T20:46:57Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891685" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973399", "reference_id": "973399", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973399" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2020-14323.html", "reference_id": "CVE-2020-14323.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T20:46:57Z/" } ], "url": "https://www.samba.org/samba/security/CVE-2020-14323.html" }, { "reference_url": "https://security.gentoo.org/glsa/202012-24", "reference_id": "GLSA-202012-24", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T20:46:57Z/" } ], "url": "https://security.gentoo.org/glsa/202012-24" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JE2M4FE3N3EDXVG4UKSVFPL7SQUGFFDP/", "reference_id": "JE2M4FE3N3EDXVG4UKSVFPL7SQUGFFDP", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T20:46:57Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JE2M4FE3N3EDXVG4UKSVFPL7SQUGFFDP/" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00008.html", "reference_id": "msg00008.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T20:46:57Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00008.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00012.html", "reference_id": "msg00012.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T20:46:57Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00012.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html", "reference_id": "msg00015.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T20:46:57Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html", "reference_id": "msg00041.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T20:46:57Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20201103-0001/", "reference_id": "ntap-20201103-0001", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T20:46:57Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20201103-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5439", "reference_id": "RHSA-2020:5439", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5439" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1647", "reference_id": "RHSA-2021:1647", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1647" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3723", "reference_id": "RHSA-2021:3723", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3723" }, { "reference_url": "https://usn.ubuntu.com/4611-1/", "reference_id": "USN-4611-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4611-1/" }, { "reference_url": "https://usn.ubuntu.com/4931-1/", "reference_id": "USN-4931-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4931-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6HM73N4NEGFW5GIJJGGP6ZZBS6GTXPB/", "reference_id": "W6HM73N4NEGFW5GIJJGGP6ZZBS6GTXPB", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T20:46:57Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6HM73N4NEGFW5GIJJGGP6ZZBS6GTXPB/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6" } ], "aliases": [ "CVE-2020-14323" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-88mw-c7mc-jugp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/45506?format=api", "vulnerability_id": "VCID-9cyh-d77a-vyhj", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20254.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20254.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20254", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01764", "scoring_system": "epss", "scoring_elements": "0.82549", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01764", "scoring_system": "epss", "scoring_elements": "0.82757", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01764", "scoring_system": "epss", "scoring_elements": "0.82716", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01764", "scoring_system": "epss", "scoring_elements": "0.82737", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01764", "scoring_system": "epss", "scoring_elements": "0.82564", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01764", "scoring_system": "epss", "scoring_elements": "0.8258", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01764", "scoring_system": "epss", "scoring_elements": "0.82576", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01764", "scoring_system": "epss", "scoring_elements": "0.82602", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01764", "scoring_system": "epss", "scoring_elements": "0.8261", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01764", "scoring_system": "epss", "scoring_elements": "0.82628", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01764", "scoring_system": "epss", "scoring_elements": "0.82622", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01764", "scoring_system": "epss", "scoring_elements": "0.82618", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01764", "scoring_system": "epss", "scoring_elements": "0.82655", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01764", "scoring_system": "epss", "scoring_elements": "0.82656", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01764", "scoring_system": "epss", "scoring_elements": "0.8266", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01764", "scoring_system": "epss", "scoring_elements": "0.82681", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01764", "scoring_system": "epss", "scoring_elements": "0.82691", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01764", "scoring_system": "epss", "scoring_elements": "0.82697", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20254" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20254", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20254" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1949442", "reference_id": "1949442", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1949442" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987811", "reference_id": "987811", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987811" }, { "reference_url": "https://security.archlinux.org/AVG-1893", "reference_id": "AVG-1893", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1893" }, { "reference_url": "https://security.gentoo.org/glsa/202105-22", "reference_id": "GLSA-202105-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202105-22" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2313", "reference_id": "RHSA-2021:2313", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2313" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3723", "reference_id": "RHSA-2021:3723", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3723" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3724", "reference_id": "RHSA-2021:3724", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3724" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3988", "reference_id": "RHSA-2021:3988", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3988" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4058", "reference_id": "RHSA-2021:4058", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4058" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4866", "reference_id": "RHSA-2021:4866", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4866" }, { "reference_url": "https://usn.ubuntu.com/4930-1/", "reference_id": "USN-4930-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4930-1/" }, { "reference_url": "https://usn.ubuntu.com/4931-1/", "reference_id": "USN-4931-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4931-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6" } ], "aliases": [ "CVE-2021-20254" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9cyh-d77a-vyhj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/44833?format=api", "vulnerability_id": "VCID-9t1m-6chr-e3dt", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10745.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10745.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-10745", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.19658", "scoring_system": "epss", "scoring_elements": "0.95388", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.19658", "scoring_system": "epss", "scoring_elements": "0.95465", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.19658", "scoring_system": "epss", "scoring_elements": "0.95451", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.19658", "scoring_system": "epss", "scoring_elements": "0.95457", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.19658", "scoring_system": "epss", "scoring_elements": "0.95397", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.19658", "scoring_system": "epss", "scoring_elements": "0.95403", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.19658", "scoring_system": "epss", "scoring_elements": "0.95406", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.19658", "scoring_system": "epss", "scoring_elements": "0.95413", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.19658", "scoring_system": "epss", "scoring_elements": "0.95416", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.19658", "scoring_system": "epss", "scoring_elements": "0.95421", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.19658", "scoring_system": "epss", "scoring_elements": "0.95423", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.19658", "scoring_system": "epss", "scoring_elements": "0.95431", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.19658", "scoring_system": "epss", "scoring_elements": "0.95435", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.19658", "scoring_system": "epss", "scoring_elements": "0.95439", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.19658", "scoring_system": "epss", "scoring_elements": "0.9544", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.19658", "scoring_system": "epss", "scoring_elements": "0.95441", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-10745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10745", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10745" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1849491", "reference_id": "1849491", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1849491" }, { "reference_url": "https://security.archlinux.org/AVG-1202", "reference_id": "AVG-1202", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1202" }, { "reference_url": "https://security.gentoo.org/glsa/202007-15", "reference_id": "GLSA-202007-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202007-15" }, { "reference_url": "https://usn.ubuntu.com/4409-1/", "reference_id": "USN-4409-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4409-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6" } ], "aliases": [ "CVE-2020-10745" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9t1m-6chr-e3dt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79392?format=api", "vulnerability_id": "VCID-ce1t-wb2k-2uct", "summary": "security update", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00035.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00035.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3824.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3824.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-3824", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.11794", "scoring_system": "epss", "scoring_elements": "0.93671", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.11794", "scoring_system": "epss", "scoring_elements": "0.93768", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.11794", "scoring_system": "epss", "scoring_elements": "0.93738", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.11794", "scoring_system": "epss", "scoring_elements": "0.93747", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.11794", "scoring_system": "epss", "scoring_elements": "0.93759", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.11794", "scoring_system": "epss", "scoring_elements": "0.93681", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.11794", "scoring_system": "epss", "scoring_elements": "0.93692", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.11794", "scoring_system": "epss", "scoring_elements": "0.93694", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.11794", "scoring_system": "epss", "scoring_elements": "0.93704", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.11794", "scoring_system": "epss", "scoring_elements": "0.93705", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.11794", "scoring_system": "epss", "scoring_elements": "0.9371", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.11794", "scoring_system": "epss", "scoring_elements": "0.93711", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.11794", "scoring_system": "epss", "scoring_elements": "0.93728", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.11794", "scoring_system": "epss", "scoring_elements": "0.93734", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.11794", "scoring_system": "epss", "scoring_elements": "0.93737", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.11794", "scoring_system": "epss", "scoring_elements": "0.93743", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.11794", "scoring_system": "epss", "scoring_elements": "0.93739", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-3824" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3824" }, { "reference_url": "https://bugzilla.samba.org/show_bug.cgi?id=13773", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.samba.org/show_bug.cgi?id=13773" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3824" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00000.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190226-0001/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20190226-0001/" }, { "reference_url": "https://www.debian.org/security/2019/dsa-4397", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2019/dsa-4397" }, { "reference_url": "http://www.securityfocus.com/bid/107347", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/107347" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671845", "reference_id": "1671845", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671845" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3824", "reference_id": "CVE-2019-3824", "reference_type": "", "scores": [ { "value": "4.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3824" }, { "reference_url": "https://usn.ubuntu.com/3895-1/", "reference_id": "USN-3895-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3895-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038160?format=api", "purl": "pkg:deb/debian/samba@2:4.9.5%2Bdfsg-5%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-5%252Bdeb10u3" } ], "aliases": [ "CVE-2019-3824" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ce1t-wb2k-2uct" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46968?format=api", "vulnerability_id": "VCID-cgez-urtv-qbhq", "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which can lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34967.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34967.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34967", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.18271", "scoring_system": "epss", "scoring_elements": "0.95252", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.18271", "scoring_system": "epss", "scoring_elements": "0.95222", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.18271", "scoring_system": "epss", "scoring_elements": "0.95225", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.18271", "scoring_system": "epss", "scoring_elements": "0.95238", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.18271", "scoring_system": "epss", "scoring_elements": "0.95244", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.21174", "scoring_system": "epss", "scoring_elements": "0.95653", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.21174", "scoring_system": "epss", "scoring_elements": "0.95662", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.21174", "scoring_system": "epss", "scoring_elements": "0.95661", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.21174", "scoring_system": "epss", "scoring_elements": "0.95664", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.21174", "scoring_system": "epss", "scoring_elements": "0.95672", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.21174", "scoring_system": "epss", "scoring_elements": "0.95676", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.21174", "scoring_system": "epss", "scoring_elements": "0.95657", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.21174", "scoring_system": "epss", "scoring_elements": "0.95637", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.21174", "scoring_system": "epss", "scoring_elements": "0.95642", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.21174", "scoring_system": "epss", "scoring_elements": "0.95645", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34967" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222794", "reference_id": "2222794", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222794" }, { "reference_url": "https://security.gentoo.org/glsa/202402-28", "reference_id": "GLSA-202402-28", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-28" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6667", "reference_id": "RHSA-2023:6667", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6667" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7139", "reference_id": "RHSA-2023:7139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7139" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0423", "reference_id": "RHSA-2024:0423", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0423" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0580", "reference_id": "RHSA-2024:0580", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0580" }, { "reference_url": "https://usn.ubuntu.com/6238-1/", "reference_id": "USN-6238-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6238-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6" } ], "aliases": [ "CVE-2023-34967" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cgez-urtv-qbhq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47955?format=api", "vulnerability_id": "VCID-cjqf-muwp-3qbq", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14629.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14629.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14629", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.09242", "scoring_system": "epss", "scoring_elements": "0.92692", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.09242", "scoring_system": "epss", "scoring_elements": "0.92771", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.09242", "scoring_system": "epss", "scoring_elements": "0.92746", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.09242", "scoring_system": "epss", "scoring_elements": "0.92759", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.09242", "scoring_system": "epss", "scoring_elements": "0.92699", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.09242", "scoring_system": "epss", "scoring_elements": "0.92705", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.09242", "scoring_system": "epss", "scoring_elements": "0.92704", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.09242", "scoring_system": "epss", "scoring_elements": "0.92714", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.09242", "scoring_system": "epss", "scoring_elements": "0.92718", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.09242", "scoring_system": "epss", "scoring_elements": "0.92724", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.09242", "scoring_system": "epss", "scoring_elements": "0.92723", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.09242", "scoring_system": "epss", "scoring_elements": "0.92734", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.09242", "scoring_system": "epss", "scoring_elements": "0.92738", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.09242", "scoring_system": "epss", "scoring_elements": "0.92742", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14629" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14629", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14629" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16841", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16851" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1625449", "reference_id": "1625449", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1625449" }, { "reference_url": "https://security.archlinux.org/ASA-201811-22", "reference_id": "ASA-201811-22", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201811-22" }, { "reference_url": "https://security.archlinux.org/AVG-823", "reference_id": "AVG-823", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-823" }, { "reference_url": "https://security.gentoo.org/glsa/202003-52", "reference_id": "GLSA-202003-52", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-52" }, { "reference_url": "https://usn.ubuntu.com/3827-1/", "reference_id": "USN-3827-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3827-1/" }, { "reference_url": "https://usn.ubuntu.com/3827-2/", "reference_id": "USN-3827-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3827-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038160?format=api", "purl": "pkg:deb/debian/samba@2:4.9.5%2Bdfsg-5%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-5%252Bdeb10u3" } ], "aliases": [ "CVE-2018-14629" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cjqf-muwp-3qbq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47967?format=api", "vulnerability_id": "VCID-crh2-zv3e-pfaa", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14907.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14907.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14907", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.10242", "scoring_system": "epss", "scoring_elements": "0.93119", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.10242", "scoring_system": "epss", "scoring_elements": "0.93129", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.10242", "scoring_system": "epss", "scoring_elements": "0.93132", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.10242", "scoring_system": "epss", "scoring_elements": "0.93131", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.10242", "scoring_system": "epss", "scoring_elements": "0.9314", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.10242", "scoring_system": "epss", "scoring_elements": "0.93144", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.10242", "scoring_system": "epss", "scoring_elements": "0.9315", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.10242", "scoring_system": "epss", "scoring_elements": "0.93147", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.10242", "scoring_system": "epss", "scoring_elements": "0.93148", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.10242", "scoring_system": "epss", "scoring_elements": "0.93165", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.10242", "scoring_system": "epss", "scoring_elements": "0.93169", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.10242", "scoring_system": "epss", "scoring_elements": "0.93177", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.10242", "scoring_system": "epss", "scoring_elements": "0.93182", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.10242", "scoring_system": "epss", "scoring_elements": "0.93181", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.10242", "scoring_system": "epss", "scoring_elements": "0.93178", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.10242", "scoring_system": "epss", "scoring_elements": "0.93185", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.10242", "scoring_system": "epss", "scoring_elements": "0.93199", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.10242", "scoring_system": "epss", "scoring_elements": "0.93209", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14907" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14907", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14907" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1791207", "reference_id": "1791207", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1791207" }, { "reference_url": "https://security.gentoo.org/glsa/202003-52", "reference_id": "GLSA-202003-52", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-52" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0943", "reference_id": "RHSA-2020:0943", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0943" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1878", "reference_id": "RHSA-2020:1878", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1878" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3981", "reference_id": "RHSA-2020:3981", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3981" }, { "reference_url": "https://usn.ubuntu.com/4244-1/", "reference_id": "USN-4244-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4244-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6" } ], "aliases": [ "CVE-2019-14907" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-crh2-zv3e-pfaa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82467?format=api", "vulnerability_id": "VCID-dzux-xe2s-fyhg", "summary": "samba: AD DC Denial of Service in DNS management server", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12435.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12435.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-12435", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0396", "scoring_system": "epss", "scoring_elements": "0.88439", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0396", "scoring_system": "epss", "scoring_elements": "0.88399", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0396", "scoring_system": "epss", "scoring_elements": "0.8841", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0396", "scoring_system": "epss", "scoring_elements": "0.88425", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0396", "scoring_system": "epss", "scoring_elements": "0.88332", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0396", "scoring_system": "epss", "scoring_elements": "0.88337", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0396", "scoring_system": "epss", "scoring_elements": "0.88356", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0396", "scoring_system": "epss", "scoring_elements": "0.88363", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0396", "scoring_system": "epss", "scoring_elements": "0.88373", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0396", "scoring_system": "epss", "scoring_elements": "0.88365", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0396", "scoring_system": "epss", "scoring_elements": "0.8838", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0396", "scoring_system": "epss", "scoring_elements": "0.88377", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0396", "scoring_system": "epss", "scoring_elements": "0.88393", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0396", "scoring_system": "epss", "scoring_elements": "0.88398", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.04135", "scoring_system": "epss", "scoring_elements": "0.88607", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04135", "scoring_system": "epss", "scoring_elements": "0.88598", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-12435" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12435", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12435" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1711816", "reference_id": "1711816", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1711816" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930748", "reference_id": "930748", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930748" }, { "reference_url": "https://usn.ubuntu.com/4018-1/", "reference_id": "USN-4018-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4018-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038160?format=api", "purl": "pkg:deb/debian/samba@2:4.9.5%2Bdfsg-5%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-5%252Bdeb10u3" } ], "aliases": [ "CVE-2019-12435" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dzux-xe2s-fyhg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46969?format=api", "vulnerability_id": "VCID-ez9s-vn2t-w7a6", "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which can lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34968.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34968.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34968", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02202", "scoring_system": "epss", "scoring_elements": "0.84552", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.02202", "scoring_system": "epss", "scoring_elements": "0.84452", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02202", "scoring_system": "epss", "scoring_elements": "0.84478", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02202", "scoring_system": "epss", "scoring_elements": "0.84487", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02202", "scoring_system": "epss", "scoring_elements": "0.84491", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02202", "scoring_system": "epss", "scoring_elements": "0.84509", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.02202", "scoring_system": "epss", "scoring_elements": "0.84536", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.02387", "scoring_system": "epss", "scoring_elements": "0.85015", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02387", "scoring_system": "epss", "scoring_elements": "0.8501", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02387", "scoring_system": "epss", "scoring_elements": "0.85031", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02387", "scoring_system": "epss", "scoring_elements": "0.85033", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02387", "scoring_system": "epss", "scoring_elements": "0.85013", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02387", "scoring_system": "epss", "scoring_elements": "0.84947", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02387", "scoring_system": "epss", "scoring_elements": "0.84965", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02387", "scoring_system": "epss", "scoring_elements": "0.84969", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02387", "scoring_system": "epss", "scoring_elements": "0.84992", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02387", "scoring_system": "epss", "scoring_elements": "0.84999", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34968" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222795", "reference_id": "2222795", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222795" }, { "reference_url": "https://security.gentoo.org/glsa/202402-28", "reference_id": "GLSA-202402-28", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-28" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6667", "reference_id": "RHSA-2023:6667", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6667" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7139", "reference_id": "RHSA-2023:7139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7139" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0423", "reference_id": "RHSA-2024:0423", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0423" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0580", "reference_id": "RHSA-2024:0580", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0580" }, { "reference_url": "https://usn.ubuntu.com/6238-1/", "reference_id": "USN-6238-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6238-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6" } ], "aliases": [ "CVE-2023-34968" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ez9s-vn2t-w7a6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48472?format=api", "vulnerability_id": "VCID-ezk6-jy86-y3h4", "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2124.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2124.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2124", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00699", "scoring_system": "epss", "scoring_elements": "0.72104", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00699", "scoring_system": "epss", "scoring_elements": "0.72007", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00699", "scoring_system": "epss", "scoring_elements": "0.72051", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00699", "scoring_system": "epss", "scoring_elements": "0.72057", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00699", "scoring_system": "epss", "scoring_elements": "0.72052", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00699", "scoring_system": "epss", "scoring_elements": "0.72044", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00699", "scoring_system": "epss", "scoring_elements": "0.72077", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00699", "scoring_system": "epss", "scoring_elements": "0.71931", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00699", "scoring_system": "epss", "scoring_elements": "0.7197", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00699", "scoring_system": "epss", "scoring_elements": "0.71982", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00699", "scoring_system": "epss", "scoring_elements": "0.72006", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00699", "scoring_system": "epss", "scoring_elements": "0.71989", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00699", "scoring_system": "epss", "scoring_elements": "0.71974", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00699", "scoring_system": "epss", "scoring_elements": "0.72015", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00699", "scoring_system": "epss", "scoring_elements": "0.72022", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00814", "scoring_system": "epss", "scoring_elements": "0.74225", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00814", "scoring_system": "epss", "scoring_elements": "0.74252", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00814", "scoring_system": "epss", "scoring_elements": "0.7422", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2124" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.9", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:M/Au:N/C:P/I:N/A:N" }, { "value": "6.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019660", "reference_id": "2019660", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019660" }, { "reference_url": "https://security.archlinux.org/AVG-2539", "reference_id": "AVG-2539", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2539" }, { "reference_url": "https://security.gentoo.org/glsa/202309-06", "reference_id": "GLSA-202309-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202309-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4843", "reference_id": "RHSA-2021:4843", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4843" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4844", "reference_id": "RHSA-2021:4844", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4844" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5082", "reference_id": "RHSA-2021:5082", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5082" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5192", "reference_id": "RHSA-2021:5192", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5192" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0008", "reference_id": "RHSA-2022:0008", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0008" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0074", "reference_id": "RHSA-2022:0074", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0074" }, { "reference_url": "https://usn.ubuntu.com/5142-1/", "reference_id": "USN-5142-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5142-1/" }, { "reference_url": "https://usn.ubuntu.com/5174-1/", "reference_id": "USN-5174-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5174-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6" } ], "aliases": [ "CVE-2016-2124" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ezk6-jy86-y3h4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48493?format=api", "vulnerability_id": "VCID-f772-3dtd-wba8", "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32742.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32742.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32742", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50607", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00574", "scoring_system": "epss", "scoring_elements": "0.6886", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00574", "scoring_system": "epss", "scoring_elements": "0.68753", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00574", "scoring_system": "epss", "scoring_elements": "0.68764", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00574", "scoring_system": "epss", "scoring_elements": "0.68742", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00574", "scoring_system": "epss", "scoring_elements": "0.6879", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00574", "scoring_system": "epss", "scoring_elements": "0.68796", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00574", "scoring_system": "epss", "scoring_elements": "0.68802", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00574", "scoring_system": "epss", "scoring_elements": "0.68782", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00574", "scoring_system": "epss", "scoring_elements": "0.68825", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00574", "scoring_system": "epss", "scoring_elements": "0.68685", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00574", "scoring_system": "epss", "scoring_elements": "0.68662", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00574", "scoring_system": "epss", "scoring_elements": "0.68714", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00574", "scoring_system": "epss", "scoring_elements": "0.68732", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00574", "scoring_system": "epss", "scoring_elements": "0.68754", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00574", "scoring_system": "epss", "scoring_elements": "0.6874", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00574", "scoring_system": "epss", "scoring_elements": "0.68711", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449", "reference_id": "1016449", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108196", "reference_id": "2108196", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108196" }, { "reference_url": "https://security.archlinux.org/AVG-2782", "reference_id": "AVG-2782", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2782" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2022-32742.html", "reference_id": "CVE-2022-32742.html", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T19:44:06Z/" } ], "url": "https://www.samba.org/samba/security/CVE-2022-32742.html" }, { "reference_url": "https://security.gentoo.org/glsa/202309-06", "reference_id": "GLSA-202309-06", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T19:44:06Z/" } ], "url": "https://security.gentoo.org/glsa/202309-06" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html", "reference_id": "msg00015.html", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T19:44:06Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7056", "reference_id": "RHSA-2022:7056", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7056" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7111", "reference_id": "RHSA-2022:7111", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7111" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8317", "reference_id": "RHSA-2022:8317", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8317" }, { "reference_url": "https://usn.ubuntu.com/5542-1/", "reference_id": "USN-5542-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5542-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6" } ], "aliases": [ "CVE-2022-32742" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f772-3dtd-wba8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48476?format=api", "vulnerability_id": "VCID-f9hv-k2xk-puhq", "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25719.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25719.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25719", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43658", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.4377", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43773", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43692", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43565", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43641", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43809", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43859", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43862", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.4388", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43848", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43831", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43893", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43885", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43818", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00248", "scoring_system": "epss", "scoring_elements": "0.4808", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00248", "scoring_system": "epss", "scoring_elements": "0.48101", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00248", "scoring_system": "epss", "scoring_elements": "0.48042", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25719" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019732", "reference_id": "2019732", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019732" }, { "reference_url": "https://security.archlinux.org/AVG-2538", "reference_id": "AVG-2538", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2538" }, { "reference_url": "https://security.gentoo.org/glsa/202309-06", "reference_id": "GLSA-202309-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202309-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5142", "reference_id": "RHSA-2021:5142", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5142" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5195", "reference_id": "RHSA-2021:5195", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5195" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0007", "reference_id": "RHSA-2022:0007", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0007" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0076", "reference_id": "RHSA-2022:0076", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0076" }, { "reference_url": "https://usn.ubuntu.com/5142-1/", "reference_id": "USN-5142-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5142-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6" } ], "aliases": [ "CVE-2020-25719" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f9hv-k2xk-puhq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/44825?format=api", "vulnerability_id": "VCID-fh3j-efv1-tybp", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10700.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10700.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-10700", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02857", "scoring_system": "epss", "scoring_elements": "0.86182", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02857", "scoring_system": "epss", "scoring_elements": "0.86192", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02857", "scoring_system": "epss", "scoring_elements": "0.86205", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02857", "scoring_system": "epss", "scoring_elements": "0.86224", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02857", "scoring_system": "epss", "scoring_elements": "0.86235", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02857", "scoring_system": "epss", "scoring_elements": "0.8625", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02857", "scoring_system": "epss", "scoring_elements": "0.86247", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02857", "scoring_system": "epss", "scoring_elements": "0.86243", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02857", "scoring_system": "epss", "scoring_elements": "0.8626", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02857", "scoring_system": "epss", "scoring_elements": "0.86265", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02857", "scoring_system": "epss", "scoring_elements": "0.86259", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02857", "scoring_system": "epss", "scoring_elements": "0.86278", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02857", "scoring_system": "epss", "scoring_elements": "0.86288", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02857", "scoring_system": "epss", "scoring_elements": "0.86308", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.02857", "scoring_system": "epss", "scoring_elements": "0.8633", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.02857", "scoring_system": "epss", "scoring_elements": "0.86349", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-10700" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10700", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10700" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1825731", "reference_id": "1825731", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1825731" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960189", "reference_id": "960189", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960189" }, { "reference_url": "https://security.gentoo.org/glsa/202007-15", "reference_id": "GLSA-202007-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202007-15" }, { "reference_url": "https://usn.ubuntu.com/4341-1/", "reference_id": "USN-4341-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4341-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6" } ], "aliases": [ "CVE-2020-10700" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fh3j-efv1-tybp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47964?format=api", "vulnerability_id": "VCID-frnd-3wwy-93ek", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14870.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14870.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14870", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89278", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89283", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89297", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.893", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89317", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89321", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.8933", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89328", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89324", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89338", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89337", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89332", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.8935", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89354", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89357", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89367", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89385", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89398", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14870" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14870", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14870" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778589", "reference_id": "1778589", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778589" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946786", "reference_id": "946786", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946786" }, { "reference_url": "https://security.gentoo.org/glsa/202003-52", "reference_id": "GLSA-202003-52", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-52" }, { "reference_url": "https://security.gentoo.org/glsa/202310-06", "reference_id": "GLSA-202310-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202310-06" }, { "reference_url": "https://usn.ubuntu.com/4217-1/", "reference_id": "USN-4217-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4217-1/" }, { "reference_url": "https://usn.ubuntu.com/4217-2/", "reference_id": "USN-4217-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4217-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6" } ], "aliases": [ "CVE-2019-14870" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "4.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-frnd-3wwy-93ek" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46494?format=api", "vulnerability_id": "VCID-fxgm-p1bm-r7ev", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which may allow remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15275.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15275.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15275", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.4327", "scoring_system": "epss", "scoring_elements": "0.97525", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.4327", "scoring_system": "epss", "scoring_elements": "0.97498", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.4327", "scoring_system": "epss", "scoring_elements": "0.975", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.4327", "scoring_system": "epss", "scoring_elements": "0.97501", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.4327", "scoring_system": "epss", "scoring_elements": "0.97509", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.4327", "scoring_system": "epss", "scoring_elements": "0.9751", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.4327", "scoring_system": "epss", "scoring_elements": "0.97511", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.4327", "scoring_system": "epss", "scoring_elements": "0.97513", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.4327", "scoring_system": "epss", "scoring_elements": "0.97518", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.4327", "scoring_system": "epss", "scoring_elements": "0.97522", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.44014", "scoring_system": "epss", "scoring_elements": "0.97522", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.44014", "scoring_system": "epss", "scoring_elements": "0.97516", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.44014", "scoring_system": "epss", "scoring_elements": "0.97525", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.45047", "scoring_system": "epss", "scoring_elements": "0.97587", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.49745", "scoring_system": "epss", "scoring_elements": "0.97801", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.49745", "scoring_system": "epss", "scoring_elements": "0.97796", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15275" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15275", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15275" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00029.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00029.html" }, { "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03817en_us", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03817en_us" }, { "reference_url": "https://www.debian.org/security/2017/dsa-4043", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2017/dsa-4043" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2017-15275.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.samba.org/samba/security/CVE-2017-15275.html" }, { "reference_url": "https://www.synology.com/support/security/Synology_SA_17_72_Samba", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.synology.com/support/security/Synology_SA_17_72_Samba" }, { "reference_url": "http://www.securityfocus.com/bid/101908", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/101908" }, { "reference_url": "http://www.securitytracker.com/id/1039855", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1039855" }, { "reference_url": "http://www.ubuntu.com/usn/USN-3486-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-3486-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-3486-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-3486-2" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1512465", "reference_id": "1512465", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1512465" }, { "reference_url": "https://security.archlinux.org/ASA-201712-1", "reference_id": "ASA-201712-1", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201712-1" }, { "reference_url": "https://security.archlinux.org/AVG-535", "reference_id": "AVG-535", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-535" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15275", "reference_id": "CVE-2017-15275", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N" }, { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15275" }, { "reference_url": "https://security.gentoo.org/glsa/201805-07", "reference_id": "GLSA-201805-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201805-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:3260", "reference_id": "RHSA-2017:3260", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:3260" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:3261", "reference_id": "RHSA-2017:3261", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:3261" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:3278", "reference_id": "RHSA-2017:3278", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:3278" }, { "reference_url": "https://usn.ubuntu.com/3486-1/", "reference_id": "USN-3486-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3486-1/" }, { "reference_url": "https://usn.ubuntu.com/3486-2/", "reference_id": "USN-3486-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3486-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038160?format=api", "purl": "pkg:deb/debian/samba@2:4.9.5%2Bdfsg-5%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-5%252Bdeb10u3" } ], "aliases": [ "CVE-2017-15275" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fxgm-p1bm-r7ev" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48474?format=api", "vulnerability_id": "VCID-gs98-hcdd-2yf9", "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25717.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25717.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25717", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00517", "scoring_system": "epss", "scoring_elements": "0.66812", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00517", "scoring_system": "epss", "scoring_elements": "0.66746", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00517", "scoring_system": "epss", "scoring_elements": "0.66758", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00517", "scoring_system": "epss", "scoring_elements": "0.66756", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00517", "scoring_system": "epss", "scoring_elements": "0.66727", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00517", "scoring_system": "epss", "scoring_elements": "0.66771", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00517", "scoring_system": "epss", "scoring_elements": "0.66649", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00517", "scoring_system": "epss", "scoring_elements": "0.66698", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00517", "scoring_system": "epss", "scoring_elements": "0.66713", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00517", "scoring_system": "epss", "scoring_elements": "0.66732", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00517", "scoring_system": "epss", "scoring_elements": "0.6672", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00517", "scoring_system": "epss", "scoring_elements": "0.6669", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00517", "scoring_system": "epss", "scoring_elements": "0.66723", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00517", "scoring_system": "epss", "scoring_elements": "0.66737", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00517", "scoring_system": "epss", "scoring_elements": "0.66722", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.66712", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.66738", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.66673", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25717" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019672", "reference_id": "2019672", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019672" }, { "reference_url": "https://security.archlinux.org/AVG-2538", "reference_id": "AVG-2538", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2538" }, { "reference_url": "https://security.gentoo.org/glsa/202309-06", "reference_id": "GLSA-202309-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202309-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4843", "reference_id": "RHSA-2021:4843", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4843" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4844", "reference_id": "RHSA-2021:4844", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4844" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5082", "reference_id": "RHSA-2021:5082", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5082" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5192", "reference_id": "RHSA-2021:5192", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5192" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0008", "reference_id": "RHSA-2022:0008", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0008" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0074", "reference_id": "RHSA-2022:0074", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0074" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0133", "reference_id": "RHSA-2022:0133", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0133" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0443", "reference_id": "RHSA-2022:0443", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0443" }, { "reference_url": "https://usn.ubuntu.com/5142-1/", "reference_id": "USN-5142-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5142-1/" }, { "reference_url": "https://usn.ubuntu.com/5174-1/", "reference_id": "USN-5174-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5174-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038160?format=api", "purl": "pkg:deb/debian/samba@2:4.9.5%2Bdfsg-5%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-5%252Bdeb10u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6" } ], "aliases": [ "CVE-2020-25717" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gs98-hcdd-2yf9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47957?format=api", "vulnerability_id": "VCID-h2pu-vhv4-yfhx", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16851.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16851.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16851", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.92672", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.92751", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.92726", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.9274", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.92679", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.92685", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.92684", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.92694", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.92699", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.92705", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.92704", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.92703", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.92715", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.9272", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.92723", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.92724", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.92718", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16851" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14629", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14629" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16841", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16851" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646377", "reference_id": "1646377", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646377" }, { "reference_url": "https://security.archlinux.org/ASA-201811-22", "reference_id": "ASA-201811-22", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201811-22" }, { "reference_url": "https://security.archlinux.org/AVG-823", "reference_id": "AVG-823", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-823" }, { "reference_url": "https://security.gentoo.org/glsa/202003-52", "reference_id": "GLSA-202003-52", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-52" }, { "reference_url": "https://usn.ubuntu.com/3827-1/", "reference_id": "USN-3827-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3827-1/" }, { "reference_url": "https://usn.ubuntu.com/3827-2/", "reference_id": "USN-3827-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3827-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038160?format=api", "purl": "pkg:deb/debian/samba@2:4.9.5%2Bdfsg-5%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-5%252Bdeb10u3" } ], "aliases": [ "CVE-2018-16851" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h2pu-vhv4-yfhx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47960?format=api", "vulnerability_id": "VCID-he7x-3928-fffk", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16857.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16857.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16857", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0224", "scoring_system": "epss", "scoring_elements": "0.84483", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0224", "scoring_system": "epss", "scoring_elements": "0.84676", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0224", "scoring_system": "epss", "scoring_elements": "0.84633", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0224", "scoring_system": "epss", "scoring_elements": "0.84659", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0224", "scoring_system": "epss", "scoring_elements": "0.84498", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0224", "scoring_system": "epss", "scoring_elements": "0.8452", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0224", "scoring_system": "epss", "scoring_elements": "0.84522", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0224", "scoring_system": "epss", "scoring_elements": "0.84544", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0224", "scoring_system": "epss", "scoring_elements": "0.84549", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0224", "scoring_system": "epss", "scoring_elements": "0.84568", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0224", "scoring_system": "epss", "scoring_elements": "0.84563", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0224", "scoring_system": "epss", "scoring_elements": "0.84559", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0224", "scoring_system": "epss", "scoring_elements": "0.84579", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0224", "scoring_system": "epss", "scoring_elements": "0.8458", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0224", "scoring_system": "epss", "scoring_elements": "0.84581", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0224", "scoring_system": "epss", "scoring_elements": "0.84607", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0224", "scoring_system": "epss", "scoring_elements": "0.84615", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0224", "scoring_system": "epss", "scoring_elements": "0.84617", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16857" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16857", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16857" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1649278", "reference_id": "1649278", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1649278" }, { "reference_url": "https://security.archlinux.org/ASA-201811-22", "reference_id": "ASA-201811-22", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201811-22" }, { "reference_url": "https://security.archlinux.org/AVG-823", "reference_id": "AVG-823", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-823" }, { "reference_url": "https://security.gentoo.org/glsa/202003-52", "reference_id": "GLSA-202003-52", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-52" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038160?format=api", "purl": "pkg:deb/debian/samba@2:4.9.5%2Bdfsg-5%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-5%252Bdeb10u3" } ], "aliases": [ "CVE-2018-16857" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-he7x-3928-fffk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48478?format=api", "vulnerability_id": "VCID-hnhm-ud2a-nugz", "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25722.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25722.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25722", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61485", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61415", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61429", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61424", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61376", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61425", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61351", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61398", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61414", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61435", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.6142", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61401", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61439", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61443", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61427", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00412", "scoring_system": "epss", "scoring_elements": "0.61415", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00412", "scoring_system": "epss", "scoring_elements": "0.61443", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00412", "scoring_system": "epss", "scoring_elements": "0.61338", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25722" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019764", "reference_id": "2019764", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019764" }, { "reference_url": "https://security.archlinux.org/AVG-2538", "reference_id": "AVG-2538", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2538" }, { "reference_url": "https://security.gentoo.org/glsa/202309-06", "reference_id": "GLSA-202309-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202309-06" }, { "reference_url": "https://usn.ubuntu.com/5142-1/", "reference_id": "USN-5142-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5142-1/" }, { "reference_url": "https://usn.ubuntu.com/5174-1/", "reference_id": "USN-5174-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5174-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6" } ], "aliases": [ "CVE-2020-25722" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hnhm-ud2a-nugz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48489?format=api", "vulnerability_id": "VCID-hzy4-16j5-8qcf", "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2031.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2031.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2031", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00323", "scoring_system": "epss", "scoring_elements": "0.55403", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00323", "scoring_system": "epss", "scoring_elements": "0.55385", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00323", "scoring_system": "epss", "scoring_elements": "0.55363", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00323", "scoring_system": "epss", "scoring_elements": "0.55414", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00323", "scoring_system": "epss", "scoring_elements": "0.55424", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00323", "scoring_system": "epss", "scoring_elements": "0.55384", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00323", "scoring_system": "epss", "scoring_elements": "0.5542", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57544", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57521", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57584", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57475", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57524", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57525", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00422", "scoring_system": "epss", "scoring_elements": "0.62033", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2031" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449", "reference_id": "1016449", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094789", "reference_id": "2094789", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094789" }, { "reference_url": "https://security.archlinux.org/AVG-2782", "reference_id": "AVG-2782", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2782" }, { "reference_url": "https://security.gentoo.org/glsa/202309-06", "reference_id": "GLSA-202309-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202309-06" }, { "reference_url": "https://usn.ubuntu.com/5542-1/", "reference_id": "USN-5542-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5542-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6" } ], "aliases": [ "CVE-2022-2031" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hzy4-16j5-8qcf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63876?format=api", "vulnerability_id": "VCID-j9a3-25xa-c3g3", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12151.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12151.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12151", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04146", "scoring_system": "epss", "scoring_elements": "0.88606", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04146", "scoring_system": "epss", "scoring_elements": "0.88729", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.04146", "scoring_system": "epss", "scoring_elements": "0.887", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.04146", "scoring_system": "epss", "scoring_elements": "0.88716", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.04146", "scoring_system": "epss", "scoring_elements": "0.88615", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04146", "scoring_system": "epss", "scoring_elements": "0.88631", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04146", "scoring_system": "epss", "scoring_elements": "0.88633", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04146", "scoring_system": "epss", "scoring_elements": "0.88651", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04146", "scoring_system": "epss", "scoring_elements": "0.88656", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04146", "scoring_system": "epss", "scoring_elements": "0.88668", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04146", "scoring_system": "epss", "scoring_elements": "0.88661", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04146", "scoring_system": "epss", "scoring_elements": "0.88675", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04146", "scoring_system": "epss", "scoring_elements": "0.88671", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04146", "scoring_system": "epss", "scoring_elements": "0.8867", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04146", "scoring_system": "epss", "scoring_elements": "0.88685", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.04146", "scoring_system": "epss", "scoring_elements": "0.8869", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.04146", "scoring_system": "epss", "scoring_elements": "0.88689", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12151" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12150", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12150" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12151", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12151" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12163", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12163" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:M/Au:N/C:C/I:C/A:N" }, { "value": "8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1488197", "reference_id": "1488197", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1488197" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2790", "reference_id": "RHSA-2017:2790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2858", "reference_id": "RHSA-2017:2858", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2858" }, { "reference_url": "https://usn.ubuntu.com/3426-1/", "reference_id": "USN-3426-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3426-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038160?format=api", "purl": "pkg:deb/debian/samba@2:4.9.5%2Bdfsg-5%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-5%252Bdeb10u3" } ], "aliases": [ "CVE-2017-12151" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j9a3-25xa-c3g3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48486?format=api", "vulnerability_id": "VCID-m44e-rw2w-vuhj", "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0336.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0336.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0336", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00382", "scoring_system": "epss", "scoring_elements": "0.59459", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00382", "scoring_system": "epss", "scoring_elements": "0.59641", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00382", "scoring_system": "epss", "scoring_elements": "0.59534", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00382", "scoring_system": "epss", "scoring_elements": "0.59583", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00382", "scoring_system": "epss", "scoring_elements": "0.59531", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00382", "scoring_system": "epss", "scoring_elements": "0.59556", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00382", "scoring_system": "epss", "scoring_elements": "0.59525", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00382", "scoring_system": "epss", "scoring_elements": "0.59576", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00382", "scoring_system": "epss", "scoring_elements": "0.59589", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00382", "scoring_system": "epss", "scoring_elements": "0.59607", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00382", "scoring_system": "epss", "scoring_elements": "0.59591", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00382", "scoring_system": "epss", "scoring_elements": "0.59571", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00382", "scoring_system": "epss", "scoring_elements": "0.59604", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00382", "scoring_system": "epss", "scoring_elements": "0.59611", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00382", "scoring_system": "epss", "scoring_elements": "0.59595", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00382", "scoring_system": "epss", "scoring_elements": "0.59567", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00382", "scoring_system": "epss", "scoring_elements": "0.59587", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00382", "scoring_system": "epss", "scoring_elements": "0.59573", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0336" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0336", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0336" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004694", "reference_id": "1004694", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004694" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046134", "reference_id": "2046134", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046134" }, { "reference_url": "https://security.archlinux.org/AVG-2648", "reference_id": "AVG-2648", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2648" }, { "reference_url": "https://security.gentoo.org/glsa/202309-06", "reference_id": "GLSA-202309-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202309-06" }, { "reference_url": "https://usn.ubuntu.com/5260-1/", "reference_id": "USN-5260-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5260-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6" } ], "aliases": [ "CVE-2022-0336" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m44e-rw2w-vuhj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47950?format=api", "vulnerability_id": "VCID-mbcb-7zmf-2yah", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10858.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10858.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10858", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90591", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90595", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90605", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90613", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90624", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90629", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90639", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90634", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90653", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.9065", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90648", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90663", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90665", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90661", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90674", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90693", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90707", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10858" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10858", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10858" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10919", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10919" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1612805", "reference_id": "1612805", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1612805" }, { "reference_url": "https://security.gentoo.org/glsa/202003-52", "reference_id": "GLSA-202003-52", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-52" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2612", "reference_id": "RHSA-2018:2612", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2612" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2613", "reference_id": "RHSA-2018:2613", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2613" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3056", "reference_id": "RHSA-2018:3056", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3056" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3470", "reference_id": "RHSA-2018:3470", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3470" }, { "reference_url": "https://usn.ubuntu.com/3738-1/", "reference_id": "USN-3738-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3738-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038160?format=api", "purl": "pkg:deb/debian/samba@2:4.9.5%2Bdfsg-5%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-5%252Bdeb10u3" } ], "aliases": [ "CVE-2018-10858" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mbcb-7zmf-2yah" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81894?format=api", "vulnerability_id": "VCID-mgaq-qjdw-fke4", "summary": "samba: AD DC check password script does not receive full password when non-ASCII characters are used", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14833.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14833.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14833", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01267", "scoring_system": "epss", "scoring_elements": "0.79414", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01267", "scoring_system": "epss", "scoring_elements": "0.79604", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01267", "scoring_system": "epss", "scoring_elements": "0.79527", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01267", "scoring_system": "epss", "scoring_elements": "0.79533", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01267", "scoring_system": "epss", "scoring_elements": "0.79549", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01267", "scoring_system": "epss", "scoring_elements": "0.79564", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01267", "scoring_system": "epss", "scoring_elements": "0.79586", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01267", "scoring_system": "epss", "scoring_elements": "0.79421", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01267", "scoring_system": "epss", "scoring_elements": "0.79444", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01267", "scoring_system": "epss", "scoring_elements": "0.7943", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01267", "scoring_system": "epss", "scoring_elements": "0.79459", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01267", "scoring_system": "epss", "scoring_elements": "0.79469", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01267", "scoring_system": "epss", "scoring_elements": "0.79491", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01267", "scoring_system": "epss", "scoring_elements": "0.79473", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01267", "scoring_system": "epss", "scoring_elements": "0.79463", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01267", "scoring_system": "epss", "scoring_elements": "0.79494", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01267", "scoring_system": "epss", "scoring_elements": "0.79496", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14833" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14833", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14833" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14833", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14833" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKPYHDFI7HRELVXBE5J4MTGSI35AKFBI/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKPYHDFI7HRELVXBE5J4MTGSI35AKFBI/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UMIYCYXCPRTVCVZ3TP6ZGPJ6RZS3IX4G/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UMIYCYXCPRTVCVZ3TP6ZGPJ6RZS3IX4G/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3IUACPZJXSC4OM6P2V4IC4QMZQZWPD/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3IUACPZJXSC4OM6P2V4IC4QMZQZWPD/" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2019-14833.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.samba.org/samba/security/CVE-2019-14833.html" }, { "reference_url": "https://www.synology.com/security/advisory/Synology_SA_19_35", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.synology.com/security/advisory/Synology_SA_19_35" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764126", "reference_id": "1764126", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764126" }, { "reference_url": "https://security.archlinux.org/ASA-201911-6", "reference_id": "ASA-201911-6", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201911-6" }, { "reference_url": "https://security.archlinux.org/AVG-1057", "reference_id": "AVG-1057", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1057" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14833", "reference_id": "CVE-2019-14833", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:S/C:P/I:P/A:N" }, { "value": "4.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" }, { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14833" }, { "reference_url": "https://usn.ubuntu.com/4167-1/", "reference_id": "USN-4167-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4167-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6" } ], "aliases": [ "CVE-2019-14833" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mgaq-qjdw-fke4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48477?format=api", "vulnerability_id": "VCID-mw6j-fkm4-pkg2", "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25721.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25721.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25721", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58669", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58566", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58611", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58646", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58667", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58633", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58685", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58691", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58709", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.5869", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.5867", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58703", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58707", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58653", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58652", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58562", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25721" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2021728", "reference_id": "2021728", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2021728" }, { "reference_url": "https://security.archlinux.org/AVG-2538", "reference_id": "AVG-2538", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2538" }, { "reference_url": "https://security.gentoo.org/glsa/202309-06", "reference_id": "GLSA-202309-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202309-06" }, { "reference_url": "https://usn.ubuntu.com/5142-1/", "reference_id": "USN-5142-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5142-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6" } ], "aliases": [ "CVE-2020-25721" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mw6j-fkm4-pkg2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46496?format=api", "vulnerability_id": "VCID-nted-1p4h-y7fz", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which may allow remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1050.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1050.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1050", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.22357", "scoring_system": "epss", "scoring_elements": "0.95782", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.22357", "scoring_system": "epss", "scoring_elements": "0.9586", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.22357", "scoring_system": "epss", "scoring_elements": "0.95852", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.22357", "scoring_system": "epss", "scoring_elements": "0.95854", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.22357", "scoring_system": "epss", "scoring_elements": "0.95792", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.22357", "scoring_system": "epss", "scoring_elements": "0.958", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.22357", "scoring_system": "epss", "scoring_elements": "0.95803", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.22357", "scoring_system": "epss", "scoring_elements": "0.95811", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.22357", "scoring_system": "epss", "scoring_elements": "0.95814", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.22357", "scoring_system": "epss", "scoring_elements": "0.95818", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.22357", "scoring_system": "epss", "scoring_elements": "0.9582", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.22357", "scoring_system": "epss", "scoring_elements": "0.95831", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.22357", "scoring_system": "epss", "scoring_elements": "0.95836", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.22357", "scoring_system": "epss", "scoring_elements": "0.95839", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.22357", "scoring_system": "epss", "scoring_elements": "0.95841", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1050" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1050", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1050" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1057", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1057" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1538771", "reference_id": "1538771", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1538771" }, { "reference_url": "https://security.archlinux.org/ASA-201803-10", "reference_id": "ASA-201803-10", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201803-10" }, { "reference_url": "https://security.archlinux.org/AVG-651", "reference_id": "AVG-651", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-651" }, { "reference_url": "https://security.gentoo.org/glsa/201805-07", "reference_id": "GLSA-201805-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201805-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1860", "reference_id": "RHSA-2018:1860", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1860" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1883", "reference_id": "RHSA-2018:1883", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1883" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2612", "reference_id": "RHSA-2018:2612", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2612" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2613", "reference_id": "RHSA-2018:2613", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2613" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3056", "reference_id": "RHSA-2018:3056", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3056" }, { "reference_url": "https://usn.ubuntu.com/3595-1/", "reference_id": "USN-3595-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3595-1/" }, { "reference_url": "https://usn.ubuntu.com/3595-2/", "reference_id": "USN-3595-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3595-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038160?format=api", "purl": "pkg:deb/debian/samba@2:4.9.5%2Bdfsg-5%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-5%252Bdeb10u3" } ], "aliases": [ "CVE-2018-1050" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nted-1p4h-y7fz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46962?format=api", "vulnerability_id": "VCID-p1se-92ae-t3b5", "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which can lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2127.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2127.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2127", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0115", "scoring_system": "epss", "scoring_elements": "0.7862", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0115", "scoring_system": "epss", "scoring_elements": "0.78507", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0115", "scoring_system": "epss", "scoring_elements": "0.7854", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0115", "scoring_system": "epss", "scoring_elements": "0.78547", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0115", "scoring_system": "epss", "scoring_elements": "0.78563", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0115", "scoring_system": "epss", "scoring_elements": "0.7858", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0115", "scoring_system": "epss", "scoring_elements": "0.78605", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01247", "scoring_system": "epss", "scoring_elements": "0.79274", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01247", "scoring_system": "epss", "scoring_elements": "0.793", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01247", "scoring_system": "epss", "scoring_elements": "0.79309", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01247", "scoring_system": "epss", "scoring_elements": "0.79333", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01247", "scoring_system": "epss", "scoring_elements": "0.79317", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01247", "scoring_system": "epss", "scoring_elements": "0.79306", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01247", "scoring_system": "epss", "scoring_elements": "0.79329", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01247", "scoring_system": "epss", "scoring_elements": "0.79265", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01247", "scoring_system": "epss", "scoring_elements": "0.79288", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222791", "reference_id": "2222791", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T15:21:45Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222791" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:8::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb", "reference_id": "cpe:/a:redhat:enterprise_linux:8::crb", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb", "reference_id": "cpe:/a:redhat:enterprise_linux:9::crb", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::resilientstorage", "reference_id": "cpe:/a:redhat:enterprise_linux:9::resilientstorage", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::resilientstorage" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream", "reference_id": "cpe:/a:redhat:rhel_eus:8.6::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb", "reference_id": "cpe:/a:redhat:rhel_eus:8.6::crb", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream", "reference_id": "cpe:/a:redhat:rhel_eus:8.8::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb", "reference_id": "cpe:/a:redhat:rhel_eus:8.8::crb", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:storage:3", "reference_id": "cpe:/a:redhat:storage:3", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:storage:3" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7", "reference_id": "cpe:/o:redhat:enterprise_linux:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos", "reference_id": "cpe:/o:redhat:enterprise_linux:8::baseos", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos", "reference_id": "cpe:/o:redhat:enterprise_linux:9::baseos", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos", "reference_id": "cpe:/o:redhat:rhel_eus:8.6::baseos", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos", "reference_id": "cpe:/o:redhat:rhel_eus:8.8::baseos", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8", "reference_id": "cpe:/o:redhat:rhev_hypervisor:4.4::el8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2022-2127", "reference_id": "CVE-2022-2127", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T15:21:45Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2022-2127" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2022-2127.html", "reference_id": "CVE-2022-2127.html", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T15:21:45Z/" } ], "url": "https://www.samba.org/samba/security/CVE-2022-2127.html" }, { "reference_url": "https://security.gentoo.org/glsa/202402-28", "reference_id": "GLSA-202402-28", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-28" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6667", "reference_id": "RHSA-2023:6667", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T15:21:45Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:6667" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7139", "reference_id": "RHSA-2023:7139", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T15:21:45Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:7139" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0423", "reference_id": "RHSA-2024:0423", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T15:21:45Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:0423" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0580", "reference_id": "RHSA-2024:0580", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T15:21:45Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:0580" }, { "reference_url": "https://usn.ubuntu.com/6238-1/", "reference_id": "USN-6238-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6238-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6" } ], "aliases": [ "CVE-2022-2127" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p1se-92ae-t3b5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82662?format=api", "vulnerability_id": "VCID-qpmw-6wg8-gbfs", "summary": "samba: World writable files in Samba AD DC private/ dir", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3870.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3870.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-3870", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0055", "scoring_system": "epss", "scoring_elements": "0.6791", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0055", "scoring_system": "epss", "scoring_elements": "0.67933", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0055", "scoring_system": "epss", "scoring_elements": "0.67952", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0055", "scoring_system": "epss", "scoring_elements": "0.67931", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0055", "scoring_system": "epss", "scoring_elements": "0.67982", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0055", "scoring_system": "epss", "scoring_elements": "0.67995", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0055", "scoring_system": "epss", "scoring_elements": "0.68018", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0055", "scoring_system": "epss", "scoring_elements": "0.68005", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0055", "scoring_system": "epss", "scoring_elements": "0.67971", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0055", "scoring_system": "epss", "scoring_elements": "0.68008", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0055", "scoring_system": "epss", "scoring_elements": "0.6802", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0055", "scoring_system": "epss", "scoring_elements": "0.68003", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0055", "scoring_system": "epss", "scoring_elements": "0.68046", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0055", "scoring_system": "epss", "scoring_elements": "0.68055", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0055", "scoring_system": "epss", "scoring_elements": "0.68061", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0055", "scoring_system": "epss", "scoring_elements": "0.68034", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0055", "scoring_system": "epss", "scoring_elements": "0.68076", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0055", "scoring_system": "epss", "scoring_elements": "0.68118", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-3870" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3870", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3870" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1689010", "reference_id": "1689010", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1689010" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038160?format=api", "purl": "pkg:deb/debian/samba@2:4.9.5%2Bdfsg-5%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-5%252Bdeb10u3" } ], "aliases": [ "CVE-2019-3870" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qpmw-6wg8-gbfs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47169?format=api", "vulnerability_id": "VCID-qt4e-73xg-bqde", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14318.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14318.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14318", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36453", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36629", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36118", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36517", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36561", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36543", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36488", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.3626", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.3623", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36143", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36024", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36093", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36661", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36498", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.3655", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36569", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36576", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36541", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14318" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14318", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14318" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892631", "reference_id": "1892631", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T14:56:23Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892631" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973400", "reference_id": "973400", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973400" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2020-14318.html", "reference_id": "CVE-2020-14318.html", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T14:56:23Z/" } ], "url": "https://www.samba.org/samba/security/CVE-2020-14318.html" }, { "reference_url": "https://security.gentoo.org/glsa/202012-24", "reference_id": "GLSA-202012-24", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T14:56:23Z/" } ], "url": "https://security.gentoo.org/glsa/202012-24" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html", "reference_id": "msg00015.html", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T14:56:23Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5439", "reference_id": "RHSA-2020:5439", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5439" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1647", "reference_id": "RHSA-2021:1647", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1647" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3723", "reference_id": "RHSA-2021:3723", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3723" }, { "reference_url": "https://usn.ubuntu.com/4611-1/", "reference_id": "USN-4611-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4611-1/" }, { "reference_url": "https://usn.ubuntu.com/4931-1/", "reference_id": "USN-4931-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4931-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6" } ], "aliases": [ "CVE-2020-14318" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qt4e-73xg-bqde" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47953?format=api", "vulnerability_id": "VCID-qx51-4w39-hyd3", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1139.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1139.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1139", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0162", "scoring_system": "epss", "scoring_elements": "0.81759", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0162", "scoring_system": "epss", "scoring_elements": "0.81769", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0162", "scoring_system": "epss", "scoring_elements": "0.81793", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0162", "scoring_system": "epss", "scoring_elements": "0.8179", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0162", "scoring_system": "epss", "scoring_elements": "0.81817", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0162", "scoring_system": "epss", "scoring_elements": "0.81823", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0162", "scoring_system": "epss", "scoring_elements": "0.81842", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0162", "scoring_system": "epss", "scoring_elements": "0.8183", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0162", "scoring_system": "epss", "scoring_elements": "0.81824", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0162", "scoring_system": "epss", "scoring_elements": "0.8186", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0162", "scoring_system": "epss", "scoring_elements": "0.81861", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0162", "scoring_system": "epss", "scoring_elements": "0.81864", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0162", "scoring_system": "epss", "scoring_elements": "0.81888", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0162", "scoring_system": "epss", "scoring_elements": "0.81898", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0162", "scoring_system": "epss", "scoring_elements": "0.81903", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0162", "scoring_system": "epss", "scoring_elements": "0.81921", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0162", "scoring_system": "epss", "scoring_elements": "0.81941", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0162", "scoring_system": "epss", "scoring_elements": "0.81966", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1139" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1139", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1139" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1589651", "reference_id": "1589651", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1589651" }, { "reference_url": "https://security.gentoo.org/glsa/202003-52", "reference_id": "GLSA-202003-52", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-52" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2612", "reference_id": "RHSA-2018:2612", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2612" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2613", "reference_id": "RHSA-2018:2613", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2613" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3056", "reference_id": "RHSA-2018:3056", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3056" }, { "reference_url": "https://usn.ubuntu.com/3738-1/", "reference_id": "USN-3738-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3738-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038160?format=api", "purl": "pkg:deb/debian/samba@2:4.9.5%2Bdfsg-5%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-5%252Bdeb10u3" } ], "aliases": [ "CVE-2018-1139" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "4.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qx51-4w39-hyd3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48497?format=api", "vulnerability_id": "VCID-rgu3-rgej-aucp", "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32745.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32745.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32745", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62228", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62153", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62203", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62221", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62238", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62207", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62253", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.6226", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62244", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62185", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00461", "scoring_system": "epss", "scoring_elements": "0.64207", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00461", "scoring_system": "epss", "scoring_elements": "0.64221", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00461", "scoring_system": "epss", "scoring_elements": "0.6419", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00461", "scoring_system": "epss", "scoring_elements": "0.64234", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00461", "scoring_system": "epss", "scoring_elements": "0.6428", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00555", "scoring_system": "epss", "scoring_elements": "0.68055", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449", "reference_id": "1016449", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108211", "reference_id": "2108211", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108211" }, { "reference_url": "https://security.archlinux.org/AVG-2782", "reference_id": "AVG-2782", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2782" }, { "reference_url": "https://security.gentoo.org/glsa/202309-06", "reference_id": "GLSA-202309-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202309-06" }, { "reference_url": "https://usn.ubuntu.com/5542-1/", "reference_id": "USN-5542-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5542-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6" } ], "aliases": [ "CVE-2022-32745" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rgu3-rgej-aucp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46967?format=api", "vulnerability_id": "VCID-rnfg-1cgy-jbaq", "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which can lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34966.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34966.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34966", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.13565", "scoring_system": "epss", "scoring_elements": "0.94281", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.13565", "scoring_system": "epss", "scoring_elements": "0.94252", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.13565", "scoring_system": "epss", "scoring_elements": "0.94256", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.13565", "scoring_system": "epss", "scoring_elements": "0.94255", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.13565", "scoring_system": "epss", "scoring_elements": "0.94259", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.13565", "scoring_system": "epss", "scoring_elements": "0.9427", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.15899", "scoring_system": "epss", "scoring_elements": "0.94744", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.15899", "scoring_system": "epss", "scoring_elements": "0.94752", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.15899", "scoring_system": "epss", "scoring_elements": "0.94761", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.15899", "scoring_system": "epss", "scoring_elements": "0.94764", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.15899", "scoring_system": "epss", "scoring_elements": "0.94748", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.15899", "scoring_system": "epss", "scoring_elements": "0.94725", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.15899", "scoring_system": "epss", "scoring_elements": "0.94729", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.15899", "scoring_system": "epss", "scoring_elements": "0.9473", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.15899", "scoring_system": "epss", "scoring_elements": "0.9474", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34966" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222793", "reference_id": "2222793", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222793" }, { "reference_url": "https://security.gentoo.org/glsa/202402-28", "reference_id": "GLSA-202402-28", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-28" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6667", "reference_id": "RHSA-2023:6667", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6667" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7139", "reference_id": "RHSA-2023:7139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7139" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0423", "reference_id": "RHSA-2024:0423", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0423" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0580", "reference_id": "RHSA-2024:0580", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0580" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4101", "reference_id": "RHSA-2024:4101", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4101" }, { "reference_url": "https://usn.ubuntu.com/6238-1/", "reference_id": "USN-6238-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6238-1/" }, { "reference_url": "https://usn.ubuntu.com/7582-1/", "reference_id": "USN-7582-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7582-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6" } ], "aliases": [ "CVE-2023-34966" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rnfg-1cgy-jbaq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/44835?format=api", "vulnerability_id": "VCID-rphh-hzna-nbgf", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10760.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10760.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-10760", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02353", "scoring_system": "epss", "scoring_elements": "0.84829", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02353", "scoring_system": "epss", "scoring_elements": "0.85019", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.02353", "scoring_system": "epss", "scoring_elements": "0.84975", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.02353", "scoring_system": "epss", "scoring_elements": "0.85", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.02353", "scoring_system": "epss", "scoring_elements": "0.84845", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02353", "scoring_system": "epss", "scoring_elements": "0.84863", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02353", "scoring_system": "epss", "scoring_elements": "0.84864", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02353", "scoring_system": "epss", "scoring_elements": "0.84887", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02353", "scoring_system": "epss", "scoring_elements": "0.84894", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02353", "scoring_system": "epss", "scoring_elements": "0.84913", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02353", "scoring_system": "epss", "scoring_elements": "0.84911", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02353", "scoring_system": "epss", "scoring_elements": "0.84905", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02353", "scoring_system": "epss", "scoring_elements": "0.84927", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02353", "scoring_system": "epss", "scoring_elements": "0.84928", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02353", "scoring_system": "epss", "scoring_elements": "0.84926", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02353", "scoring_system": "epss", "scoring_elements": "0.84951", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02353", "scoring_system": "epss", "scoring_elements": "0.84959", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02353", "scoring_system": "epss", "scoring_elements": "0.84958", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-10760" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10760", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10760" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1849509", "reference_id": "1849509", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1849509" }, { "reference_url": "https://security.archlinux.org/AVG-1202", "reference_id": "AVG-1202", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1202" }, { "reference_url": "https://security.gentoo.org/glsa/202007-15", "reference_id": "GLSA-202007-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202007-15" }, { "reference_url": "https://usn.ubuntu.com/4409-1/", "reference_id": "USN-4409-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4409-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6" } ], "aliases": [ "CVE-2020-10760" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rphh-hzna-nbgf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46493?format=api", "vulnerability_id": "VCID-rvux-gcuh-vuca", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which may allow remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14746.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14746.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-14746", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.31253", "scoring_system": "epss", "scoring_elements": "0.96799", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.31253", "scoring_system": "epss", "scoring_elements": "0.96762", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.31253", "scoring_system": "epss", "scoring_elements": "0.96765", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.31253", "scoring_system": "epss", "scoring_elements": "0.9677", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.31253", "scoring_system": "epss", "scoring_elements": "0.96775", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.31253", "scoring_system": "epss", "scoring_elements": "0.96777", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.31253", "scoring_system": "epss", "scoring_elements": "0.96779", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.31253", "scoring_system": "epss", "scoring_elements": "0.96781", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.31253", "scoring_system": "epss", "scoring_elements": "0.96791", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.31253", "scoring_system": "epss", "scoring_elements": "0.96794", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.32893", "scoring_system": "epss", "scoring_elements": "0.96879", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.42986", "scoring_system": "epss", "scoring_elements": "0.97462", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.42986", "scoring_system": "epss", "scoring_elements": "0.9748", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.42986", "scoring_system": "epss", "scoring_elements": "0.97469", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.42986", "scoring_system": "epss", "scoring_elements": "0.97473", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.42986", "scoring_system": "epss", "scoring_elements": "0.97474", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-14746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15275", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15275" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03817en_us", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03817en_us" }, { "reference_url": "https://www.debian.org/security/2017/dsa-4043", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2017/dsa-4043" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2017-14746.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.samba.org/samba/security/CVE-2017-14746.html" }, { "reference_url": "https://www.synology.com/support/security/Synology_SA_17_72_Samba", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.synology.com/support/security/Synology_SA_17_72_Samba" }, { "reference_url": "http://www.securityfocus.com/bid/101907", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/101907" }, { "reference_url": "http://www.securitytracker.com/id/1039856", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1039856" }, { "reference_url": "http://www.ubuntu.com/usn/USN-3486-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-3486-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1511899", "reference_id": "1511899", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1511899" }, { "reference_url": "https://security.archlinux.org/ASA-201712-1", "reference_id": "ASA-201712-1", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201712-1" }, { "reference_url": "https://security.archlinux.org/AVG-535", "reference_id": "AVG-535", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-535" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-14746", "reference_id": "CVE-2017-14746", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-14746" }, { "reference_url": "https://security.gentoo.org/glsa/201805-07", "reference_id": "GLSA-201805-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201805-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:3260", "reference_id": "RHSA-2017:3260", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:3260" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:3261", "reference_id": "RHSA-2017:3261", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:3261" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:3278", "reference_id": "RHSA-2017:3278", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:3278" }, { "reference_url": "https://usn.ubuntu.com/3486-1/", "reference_id": "USN-3486-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3486-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038160?format=api", "purl": "pkg:deb/debian/samba@2:4.9.5%2Bdfsg-5%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-5%252Bdeb10u3" } ], "aliases": [ "CVE-2017-14746" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rvux-gcuh-vuca" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48490?format=api", "vulnerability_id": "VCID-s2ne-rcp3-nbgz", "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3437.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3437.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3437", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72705", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72529", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72545", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72522", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.7256", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72572", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72596", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72579", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72568", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.7261", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72621", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72612", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72654", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72663", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72659", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.7265", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72681", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3437" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/02/08/1", "reference_id": "1", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/02/08/1" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187", "reference_id": "1024187", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137774", "reference_id": "2137774", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137774" }, { "reference_url": "https://security.archlinux.org/AVG-2828", "reference_id": "AVG-2828", "reference_type": "", "scores": [ { "value": "Unknown", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2828" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2022-3437", "reference_id": "CVE-2022-3437", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2022-3437" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2022-3437.html", "reference_id": "CVE-2022-3437.html", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/" } ], "url": "https://www.samba.org/samba/security/CVE-2022-3437.html" }, { "reference_url": "https://security.gentoo.org/glsa/202309-06", "reference_id": "GLSA-202309-06", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/" } ], "url": "https://security.gentoo.org/glsa/202309-06" }, { "reference_url": "https://security.gentoo.org/glsa/202310-06", "reference_id": "GLSA-202310-06", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/" } ], "url": "https://security.gentoo.org/glsa/202310-06" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html", "reference_id": "msg00015.html", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230216-0008/", "reference_id": "ntap-20230216-0008", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230216-0008/" }, { "reference_url": "https://usn.ubuntu.com/5800-1/", "reference_id": "USN-5800-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5800-1/" }, { "reference_url": "https://usn.ubuntu.com/5822-1/", "reference_id": "USN-5822-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5822-1/" }, { "reference_url": "https://usn.ubuntu.com/5936-1/", "reference_id": "USN-5936-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5936-1/" }, { "reference_url": "https://usn.ubuntu.com/7582-1/", "reference_id": "USN-7582-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7582-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6" } ], "aliases": [ "CVE-2022-3437" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s2ne-rcp3-nbgz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81893?format=api", "vulnerability_id": "VCID-s6ma-9h2y-hyc4", "summary": "samba: smb client vulnerable to filenames containing path separators", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10218.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10218.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10218", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04508", "scoring_system": "epss", "scoring_elements": "0.89084", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04508", "scoring_system": "epss", "scoring_elements": "0.8921", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.04508", "scoring_system": "epss", "scoring_elements": "0.89165", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.04508", "scoring_system": "epss", "scoring_elements": "0.8917", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.04508", "scoring_system": "epss", "scoring_elements": "0.89175", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.04508", "scoring_system": "epss", "scoring_elements": "0.89183", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.04508", "scoring_system": "epss", "scoring_elements": "0.89199", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.04508", "scoring_system": "epss", "scoring_elements": "0.89093", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04508", "scoring_system": "epss", "scoring_elements": "0.89107", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04508", "scoring_system": "epss", "scoring_elements": "0.8911", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04508", "scoring_system": "epss", "scoring_elements": "0.89128", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04508", "scoring_system": "epss", "scoring_elements": "0.89133", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04508", "scoring_system": "epss", "scoring_elements": "0.89144", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04508", "scoring_system": "epss", "scoring_elements": "0.8914", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04508", "scoring_system": "epss", "scoring_elements": "0.89138", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04508", "scoring_system": "epss", "scoring_elements": "0.89151", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04508", "scoring_system": "epss", "scoring_elements": "0.89148", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10218" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10218", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10218" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10218", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10218" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKPYHDFI7HRELVXBE5J4MTGSI35AKFBI/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKPYHDFI7HRELVXBE5J4MTGSI35AKFBI/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UMIYCYXCPRTVCVZ3TP6ZGPJ6RZS3IX4G/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UMIYCYXCPRTVCVZ3TP6ZGPJ6RZS3IX4G/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3IUACPZJXSC4OM6P2V4IC4QMZQZWPD/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3IUACPZJXSC4OM6P2V4IC4QMZQZWPD/" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2019-10218.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.samba.org/samba/security/CVE-2019-10218.html" }, { "reference_url": "https://www.synology.com/security/advisory/Synology_SA_19_35", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.synology.com/security/advisory/Synology_SA_19_35" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763137", "reference_id": "1763137", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763137" }, { "reference_url": "https://security.archlinux.org/ASA-201911-6", "reference_id": "ASA-201911-6", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201911-6" }, { "reference_url": "https://security.archlinux.org/AVG-1057", "reference_id": "AVG-1057", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1057" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10218", "reference_id": "CVE-2019-10218", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10218" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0943", "reference_id": "RHSA-2020:0943", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0943" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1084", "reference_id": "RHSA-2020:1084", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1084" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1878", "reference_id": "RHSA-2020:1878", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1878" }, { "reference_url": "https://usn.ubuntu.com/4167-1/", "reference_id": "USN-4167-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4167-1/" }, { "reference_url": "https://usn.ubuntu.com/4167-2/", "reference_id": "USN-4167-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4167-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6" } ], "aliases": [ "CVE-2019-10218" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s6ma-9h2y-hyc4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47952?format=api", "vulnerability_id": "VCID-sd1b-cmgu-23h3", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10919.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10919.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10919", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01182", "scoring_system": "epss", "scoring_elements": "0.7876", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01182", "scoring_system": "epss", "scoring_elements": "0.78786", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01182", "scoring_system": "epss", "scoring_elements": "0.78769", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.80206", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.80223", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.80233", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.80352", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.80369", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.80329", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.80195", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.80261", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.80262", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.80265", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.80291", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.80298", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.80314", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01785", "scoring_system": "epss", "scoring_elements": "0.82664", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01785", "scoring_system": "epss", "scoring_elements": "0.8268", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10919" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10858", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10858" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10919", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10919" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610645", "reference_id": "1610645", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610645" }, { "reference_url": "https://security.gentoo.org/glsa/202003-52", "reference_id": "GLSA-202003-52", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-52" }, { "reference_url": "https://usn.ubuntu.com/3738-1/", "reference_id": "USN-3738-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3738-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038160?format=api", "purl": "pkg:deb/debian/samba@2:4.9.5%2Bdfsg-5%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-5%252Bdeb10u3" } ], "aliases": [ "CVE-2018-10919" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sd1b-cmgu-23h3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46965?format=api", "vulnerability_id": "VCID-smxs-4de1-nfec", "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which can lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4091.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4091.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4091", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00438", "scoring_system": "epss", "scoring_elements": "0.63243", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00438", "scoring_system": "epss", "scoring_elements": "0.63147", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00438", "scoring_system": "epss", "scoring_elements": "0.63169", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00438", "scoring_system": "epss", "scoring_elements": "0.63183", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00438", "scoring_system": "epss", "scoring_elements": "0.63181", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00438", "scoring_system": "epss", "scoring_elements": "0.63191", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00476", "scoring_system": "epss", "scoring_elements": "0.6485", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00476", "scoring_system": "epss", "scoring_elements": "0.64884", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00476", "scoring_system": "epss", "scoring_elements": "0.64921", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00476", "scoring_system": "epss", "scoring_elements": "0.64931", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00476", "scoring_system": "epss", "scoring_elements": "0.64877", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00476", "scoring_system": "epss", "scoring_elements": "0.6484", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00476", "scoring_system": "epss", "scoring_elements": "0.6489", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00476", "scoring_system": "epss", "scoring_elements": "0.64905", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00476", "scoring_system": "epss", "scoring_elements": "0.64922", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00476", "scoring_system": "epss", "scoring_elements": "0.64912", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4091" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241882", "reference_id": "2241882", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T16:18:12Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241882" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:8::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb", "reference_id": "cpe:/a:redhat:enterprise_linux:8::crb", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb", "reference_id": "cpe:/a:redhat:enterprise_linux:9::crb", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::resilientstorage", "reference_id": "cpe:/a:redhat:enterprise_linux:9::resilientstorage", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::resilientstorage" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream", "reference_id": "cpe:/a:redhat:rhel_eus:8.6::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb", "reference_id": "cpe:/a:redhat:rhel_eus:8.6::crb", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream", "reference_id": "cpe:/a:redhat:rhel_eus:8.8::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb", "reference_id": "cpe:/a:redhat:rhel_eus:8.8::crb", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream", "reference_id": "cpe:/a:redhat:rhel_eus:9.0::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb", "reference_id": "cpe:/a:redhat:rhel_eus:9.0::crb", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::resilientstorage", "reference_id": "cpe:/a:redhat:rhel_eus:9.0::resilientstorage", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::resilientstorage" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream", "reference_id": "cpe:/a:redhat:rhel_eus:9.2::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb", "reference_id": "cpe:/a:redhat:rhel_eus:9.2::crb", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::resilientstorage", "reference_id": "cpe:/a:redhat:rhel_eus:9.2::resilientstorage", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::resilientstorage" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:storage:3", "reference_id": "cpe:/a:redhat:storage:3", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:storage:3" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7", "reference_id": "cpe:/o:redhat:enterprise_linux:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos", "reference_id": "cpe:/o:redhat:enterprise_linux:8::baseos", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos", "reference_id": "cpe:/o:redhat:enterprise_linux:9::baseos", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos", "reference_id": "cpe:/o:redhat:rhel_eus:8.6::baseos", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos", "reference_id": "cpe:/o:redhat:rhel_eus:8.8::baseos", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.0::baseos", "reference_id": "cpe:/o:redhat:rhel_eus:9.0::baseos", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.0::baseos" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos", "reference_id": "cpe:/o:redhat:rhel_eus:9.2::baseos", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8", "reference_id": "cpe:/o:redhat:rhev_hypervisor:4.4::el8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2023-4091", "reference_id": "CVE-2023-4091", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T16:18:12Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2023-4091" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2023-4091.html", "reference_id": "CVE-2023-4091.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T16:18:12Z/" } ], "url": "https://www.samba.org/samba/security/CVE-2023-4091.html" }, { "reference_url": "https://security.gentoo.org/glsa/202402-28", "reference_id": "GLSA-202402-28", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-28" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6209", "reference_id": "RHSA-2023:6209", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T16:18:12Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:6209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6744", "reference_id": "RHSA-2023:6744", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T16:18:12Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:6744" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7371", "reference_id": "RHSA-2023:7371", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T16:18:12Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:7371" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7408", "reference_id": "RHSA-2023:7408", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T16:18:12Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:7408" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7464", "reference_id": "RHSA-2023:7464", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T16:18:12Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:7464" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7467", "reference_id": "RHSA-2023:7467", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T16:18:12Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:7467" }, { "reference_url": "https://bugzilla.samba.org/show_bug.cgi?id=15439", "reference_id": "show_bug.cgi?id=15439", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T16:18:12Z/" } ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=15439" }, { "reference_url": "https://usn.ubuntu.com/6425-1/", "reference_id": "USN-6425-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6425-1/" }, { "reference_url": "https://usn.ubuntu.com/6425-3/", "reference_id": "USN-6425-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6425-3/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6" } ], "aliases": [ "CVE-2023-4091" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-smxs-4de1-nfec" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48498?format=api", "vulnerability_id": "VCID-t3zy-v34p-7uen", "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32746.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32746.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32746", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00302", "scoring_system": "epss", "scoring_elements": "0.53475", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56657", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56638", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.5669", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56694", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56703", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56678", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56688", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56687", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56659", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.5666", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00368", "scoring_system": "epss", "scoring_elements": "0.58687", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00368", "scoring_system": "epss", "scoring_elements": "0.58655", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00368", "scoring_system": "epss", "scoring_elements": "0.58699", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00368", "scoring_system": "epss", "scoring_elements": "0.58757", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00368", "scoring_system": "epss", "scoring_elements": "0.58688", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00368", "scoring_system": "epss", "scoring_elements": "0.58703", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449", "reference_id": "1016449", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108215", "reference_id": "2108215", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108215" }, { "reference_url": "https://security.archlinux.org/AVG-2782", "reference_id": "AVG-2782", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2782" }, { "reference_url": "https://security.gentoo.org/glsa/202309-06", "reference_id": "GLSA-202309-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202309-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7730", "reference_id": "RHSA-2022:7730", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7730" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8318", "reference_id": "RHSA-2022:8318", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8318" }, { "reference_url": "https://usn.ubuntu.com/5542-1/", "reference_id": "USN-5542-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5542-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6" } ], "aliases": [ "CVE-2022-32746" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t3zy-v34p-7uen" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63790?format=api", "vulnerability_id": "VCID-tcbv-cguk-hfg2", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11103.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11103.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-11103", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05706", "scoring_system": "epss", "scoring_elements": "0.90483", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.05706", "scoring_system": "epss", "scoring_elements": "0.90446", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.05706", "scoring_system": "epss", "scoring_elements": "0.90445", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.05706", "scoring_system": "epss", "scoring_elements": "0.90442", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.05706", "scoring_system": "epss", "scoring_elements": "0.90454", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.05706", "scoring_system": "epss", "scoring_elements": "0.90471", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.06302", "scoring_system": "epss", "scoring_elements": "0.90958", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06302", "scoring_system": "epss", "scoring_elements": "0.90959", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.06302", "scoring_system": "epss", "scoring_elements": "0.90983", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.06302", "scoring_system": "epss", "scoring_elements": "0.90981", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.06302", "scoring_system": "epss", "scoring_elements": "0.90982", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.06302", "scoring_system": "epss", "scoring_elements": "0.90907", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06302", "scoring_system": "epss", "scoring_elements": "0.90912", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06302", "scoring_system": "epss", "scoring_elements": "0.90922", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06302", "scoring_system": "epss", "scoring_elements": "0.90932", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06302", "scoring_system": "epss", "scoring_elements": "0.90943", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06302", "scoring_system": "epss", "scoring_elements": "0.9095", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-11103" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11103", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11103" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1469976", "reference_id": "1469976", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1469976" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=868208", "reference_id": "868208", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=868208" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=868209", "reference_id": "868209", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=868209" }, { "reference_url": "https://usn.ubuntu.com/3353-1/", "reference_id": "USN-3353-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3353-1/" }, { "reference_url": "https://usn.ubuntu.com/3353-2/", "reference_id": "USN-3353-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3353-2/" }, { "reference_url": "https://usn.ubuntu.com/3353-3/", "reference_id": "USN-3353-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3353-3/" }, { "reference_url": "https://usn.ubuntu.com/3353-4/", "reference_id": "USN-3353-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3353-4/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038160?format=api", "purl": "pkg:deb/debian/samba@2:4.9.5%2Bdfsg-5%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-5%252Bdeb10u3" } ], "aliases": [ "CVE-2017-11103" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tcbv-cguk-hfg2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48480?format=api", "vulnerability_id": "VCID-tk1x-bex4-8kbz", "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3738.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3738.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3738", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60859", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60825", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60809", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60797", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60811", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60803", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60754", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60801", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60863", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.6085", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60831", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60873", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60711", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60826", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60842", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60784", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60813", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60777", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3738" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2021726", "reference_id": "2021726", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2021726" }, { "reference_url": "https://security.archlinux.org/AVG-2538", "reference_id": "AVG-2538", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2538" }, { "reference_url": "https://security.gentoo.org/glsa/202309-06", "reference_id": "GLSA-202309-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202309-06" }, { "reference_url": "https://usn.ubuntu.com/5142-1/", "reference_id": "USN-5142-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5142-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6" } ], "aliases": [ "CVE-2021-3738" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tk1x-bex4-8kbz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47958?format=api", "vulnerability_id": "VCID-tskp-1ra2-wyez", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16852.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16852.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16852", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02897", "scoring_system": "epss", "scoring_elements": "0.86261", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02897", "scoring_system": "epss", "scoring_elements": "0.86425", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.02897", "scoring_system": "epss", "scoring_elements": "0.86385", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.02897", "scoring_system": "epss", "scoring_elements": "0.86405", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.02897", "scoring_system": "epss", "scoring_elements": "0.86271", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02897", "scoring_system": "epss", "scoring_elements": "0.86289", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02897", "scoring_system": "epss", "scoring_elements": "0.86307", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02897", "scoring_system": "epss", "scoring_elements": "0.86317", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02897", "scoring_system": "epss", "scoring_elements": "0.86332", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02897", "scoring_system": "epss", "scoring_elements": "0.8633", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02897", "scoring_system": "epss", "scoring_elements": "0.86325", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02897", "scoring_system": "epss", "scoring_elements": "0.86341", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02897", "scoring_system": "epss", "scoring_elements": "0.86345", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02897", "scoring_system": "epss", "scoring_elements": "0.86339", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02897", "scoring_system": "epss", "scoring_elements": "0.8636", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02897", "scoring_system": "epss", "scoring_elements": "0.86369", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02897", "scoring_system": "epss", "scoring_elements": "0.86365", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16852" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16852", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16852" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646386", "reference_id": "1646386", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646386" }, { "reference_url": "https://security.archlinux.org/ASA-201811-22", "reference_id": "ASA-201811-22", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201811-22" }, { "reference_url": "https://security.archlinux.org/AVG-823", "reference_id": "AVG-823", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-823" }, { "reference_url": "https://security.gentoo.org/glsa/202003-52", "reference_id": "GLSA-202003-52", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-52" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038160?format=api", "purl": "pkg:deb/debian/samba@2:4.9.5%2Bdfsg-5%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-5%252Bdeb10u3" } ], "aliases": [ "CVE-2018-16852" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tskp-1ra2-wyez" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47959?format=api", "vulnerability_id": "VCID-v39j-84q1-j3ef", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16853.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16853.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16853", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04908", "scoring_system": "epss", "scoring_elements": "0.89565", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04908", "scoring_system": "epss", "scoring_elements": "0.89569", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04908", "scoring_system": "epss", "scoring_elements": "0.89582", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04908", "scoring_system": "epss", "scoring_elements": "0.89583", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04908", "scoring_system": "epss", "scoring_elements": "0.89599", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04908", "scoring_system": "epss", "scoring_elements": "0.89604", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04908", "scoring_system": "epss", "scoring_elements": "0.89611", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04908", "scoring_system": "epss", "scoring_elements": "0.8961", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04908", "scoring_system": "epss", "scoring_elements": "0.89618", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04908", "scoring_system": "epss", "scoring_elements": "0.89619", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04908", "scoring_system": "epss", "scoring_elements": "0.89615", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04908", "scoring_system": "epss", "scoring_elements": "0.8963", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.04908", "scoring_system": "epss", "scoring_elements": "0.89634", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.04908", "scoring_system": "epss", "scoring_elements": "0.89643", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.04908", "scoring_system": "epss", "scoring_elements": "0.89661", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.04908", "scoring_system": "epss", "scoring_elements": "0.89673", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16853" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16853", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16853" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1647246", "reference_id": "1647246", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1647246" }, { "reference_url": "https://security.archlinux.org/ASA-201811-22", "reference_id": "ASA-201811-22", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201811-22" }, { "reference_url": "https://security.archlinux.org/AVG-823", "reference_id": "AVG-823", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-823" }, { "reference_url": "https://security.gentoo.org/glsa/202003-52", "reference_id": "GLSA-202003-52", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-52" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038160?format=api", "purl": "pkg:deb/debian/samba@2:4.9.5%2Bdfsg-5%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-5%252Bdeb10u3" } ], "aliases": [ "CVE-2018-16853" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v39j-84q1-j3ef" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/44826?format=api", "vulnerability_id": "VCID-vg7n-k8px-ayd5", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10704.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10704.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-10704", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.08887", "scoring_system": "epss", "scoring_elements": "0.92525", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.08887", "scoring_system": "epss", "scoring_elements": "0.92531", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.08887", "scoring_system": "epss", "scoring_elements": "0.92538", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.08887", "scoring_system": "epss", "scoring_elements": "0.92541", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.08887", "scoring_system": "epss", "scoring_elements": "0.92552", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.08887", "scoring_system": "epss", "scoring_elements": "0.92557", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.08887", "scoring_system": "epss", "scoring_elements": "0.92563", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.08887", "scoring_system": "epss", "scoring_elements": "0.92564", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.08887", "scoring_system": "epss", "scoring_elements": "0.92574", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.08887", "scoring_system": "epss", "scoring_elements": "0.92577", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.08887", "scoring_system": "epss", "scoring_elements": "0.92579", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.08887", "scoring_system": "epss", "scoring_elements": "0.92576", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.08887", "scoring_system": "epss", "scoring_elements": "0.92586", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.08887", "scoring_system": "epss", "scoring_elements": "0.92598", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.08887", "scoring_system": "epss", "scoring_elements": "0.92608", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-10704" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10704", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10704" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1825734", "reference_id": "1825734", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1825734" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960188", "reference_id": "960188", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960188" }, { "reference_url": "https://security.gentoo.org/glsa/202007-15", "reference_id": "GLSA-202007-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202007-15" }, { "reference_url": "https://usn.ubuntu.com/4341-1/", "reference_id": "USN-4341-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4341-1/" }, { "reference_url": "https://usn.ubuntu.com/4341-2/", "reference_id": "USN-4341-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4341-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6" } ], "aliases": [ "CVE-2020-10704" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vg7n-k8px-ayd5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47172?format=api", "vulnerability_id": "VCID-vnc5-neuk-m3ar", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1472.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1472.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-1472", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.9438", "scoring_system": "epss", "scoring_elements": "0.9997", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.9438", "scoring_system": "epss", "scoring_elements": "0.99969", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.9438", "scoring_system": "epss", "scoring_elements": "0.99968", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-1472" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1472", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1472" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879822", "reference_id": "1879822", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879822" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2020/09/17/2", "reference_id": "2", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2020/09/17/2" }, { "reference_url": "https://www.kb.cert.org/vuls/id/490028", "reference_id": "490028", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/" } ], "url": "https://www.kb.cert.org/vuls/id/490028" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=971048", "reference_id": "971048", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=971048" }, { "reference_url": "https://security.archlinux.org/ASA-202009-17", "reference_id": "ASA-202009-17", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202009-17" }, { "reference_url": "https://security.archlinux.org/AVG-1236", "reference_id": "AVG-1236", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1236" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", "reference_id": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", "reference_id": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", "reference_id": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/49071.py", "reference_id": "CVE-2020-1472", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/49071.py" }, { "reference_url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472", "reference_id": "CVE-2020-1472", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/" } ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472" }, { "reference_url": "https://security.gentoo.org/glsa/202012-24", "reference_id": "GLSA-202012-24", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/" } ], "url": "https://security.gentoo.org/glsa/202012-24" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4OTFBL6YDVFH2TBJFJIE4FMHPJEEJK3/", "reference_id": "H4OTFBL6YDVFH2TBJFJIE4FMHPJEEJK3", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4OTFBL6YDVFH2TBJFJIE4FMHPJEEJK3/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html", "reference_id": "msg00041.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00080.html", "reference_id": "msg00080.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00080.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00086.html", "reference_id": "msg00086.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00086.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5439", "reference_id": "RHSA-2020:5439", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5439" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1647", "reference_id": "RHSA-2021:1647", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1647" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3723", "reference_id": "RHSA-2021:3723", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3723" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ST6X3A2XXYMGD4INR26DQ4FP4QSM753B/", "reference_id": "ST6X3A2XXYMGD4INR26DQ4FP4QSM753B", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ST6X3A2XXYMGD4INR26DQ4FP4QSM753B/" }, { "reference_url": "https://www.synology.com/security/advisory/Synology_SA_20_21", "reference_id": "Synology_SA_20_21", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/" } ], "url": "https://www.synology.com/security/advisory/Synology_SA_20_21" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TAPQQZZAT4TG3XVRTAFV2Y3S7OAHFBUP/", "reference_id": "TAPQQZZAT4TG3XVRTAFV2Y3S7OAHFBUP", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TAPQQZZAT4TG3XVRTAFV2Y3S7OAHFBUP/" }, { "reference_url": "https://usn.ubuntu.com/4510-1/", "reference_id": "USN-4510-1", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/" } ], "url": "https://usn.ubuntu.com/4510-1/" }, { "reference_url": "https://usn.ubuntu.com/4510-2/", "reference_id": "USN-4510-2", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/" } ], "url": "https://usn.ubuntu.com/4510-2/" }, { "reference_url": "https://usn.ubuntu.com/4559-1/", "reference_id": "USN-4559-1", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/" } ], "url": "https://usn.ubuntu.com/4559-1/" }, { "reference_url": "http://packetstormsecurity.com/files/160127/Zerologon-Netlogon-Privilege-Escalation.html", "reference_id": "Zerologon-Netlogon-Privilege-Escalation.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/" } ], "url": "http://packetstormsecurity.com/files/160127/Zerologon-Netlogon-Privilege-Escalation.html" }, { "reference_url": "http://packetstormsecurity.com/files/159190/Zerologon-Proof-Of-Concept.html", "reference_id": "Zerologon-Proof-Of-Concept.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/" } ], "url": "http://packetstormsecurity.com/files/159190/Zerologon-Proof-Of-Concept.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6" } ], "aliases": [ "CVE-2020-1472" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vnc5-neuk-m3ar" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/44829?format=api", "vulnerability_id": "VCID-vu43-fq85-a7eq", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10730.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10730.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-10730", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0314", "scoring_system": "epss", "scoring_elements": "0.86825", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0314", "scoring_system": "epss", "scoring_elements": "0.86986", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0314", "scoring_system": "epss", "scoring_elements": "0.8695", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0314", "scoring_system": "epss", "scoring_elements": "0.86968", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0314", "scoring_system": "epss", "scoring_elements": "0.86836", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0314", "scoring_system": "epss", "scoring_elements": "0.86855", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0314", "scoring_system": "epss", "scoring_elements": "0.86849", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0314", "scoring_system": "epss", "scoring_elements": "0.86868", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0314", "scoring_system": "epss", "scoring_elements": "0.86877", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0314", "scoring_system": "epss", "scoring_elements": "0.8689", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0314", "scoring_system": "epss", "scoring_elements": "0.86885", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0314", "scoring_system": "epss", "scoring_elements": "0.8688", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0314", "scoring_system": "epss", "scoring_elements": "0.86898", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0314", "scoring_system": "epss", "scoring_elements": "0.86903", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0314", "scoring_system": "epss", "scoring_elements": "0.8692", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0314", "scoring_system": "epss", "scoring_elements": "0.86926", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0314", "scoring_system": "epss", "scoring_elements": "0.86929", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-10730" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10730", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10730" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27840", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27840" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20277", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20277" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1849489", "reference_id": "1849489", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1849489" }, { "reference_url": "https://security.archlinux.org/AVG-1202", "reference_id": "AVG-1202", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1202" }, { "reference_url": "https://security.gentoo.org/glsa/202007-15", "reference_id": "GLSA-202007-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202007-15" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3118", "reference_id": "RHSA-2020:3118", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3118" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3119", "reference_id": "RHSA-2020:3119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3119" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4568", "reference_id": "RHSA-2020:4568", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4568" }, { "reference_url": "https://usn.ubuntu.com/4409-1/", "reference_id": "USN-4409-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4409-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6" } ], "aliases": [ "CVE-2020-10730" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vu43-fq85-a7eq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46497?format=api", "vulnerability_id": "VCID-wbrt-6f84-p3gu", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which may allow remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1057.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1057.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1057", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07722", "scoring_system": "epss", "scoring_elements": "0.9189", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07722", "scoring_system": "epss", "scoring_elements": "0.91899", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07722", "scoring_system": "epss", "scoring_elements": "0.91906", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07722", "scoring_system": "epss", "scoring_elements": "0.91913", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07722", "scoring_system": "epss", "scoring_elements": "0.91926", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07722", "scoring_system": "epss", "scoring_elements": "0.91931", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07722", "scoring_system": "epss", "scoring_elements": "0.91935", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07722", "scoring_system": "epss", "scoring_elements": "0.91934", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07722", "scoring_system": "epss", "scoring_elements": "0.9195", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.07722", "scoring_system": "epss", "scoring_elements": "0.91946", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.07722", "scoring_system": "epss", "scoring_elements": "0.91943", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.07722", "scoring_system": "epss", "scoring_elements": "0.91948", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.07722", "scoring_system": "epss", "scoring_elements": "0.91947", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.07722", "scoring_system": "epss", "scoring_elements": "0.91942", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.07722", "scoring_system": "epss", "scoring_elements": "0.91955", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.07722", "scoring_system": "epss", "scoring_elements": "0.91969", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.07722", "scoring_system": "epss", "scoring_elements": "0.91978", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1057" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1050", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1050" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1057", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1057" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553553", "reference_id": "1553553", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553553" }, { "reference_url": "https://security.archlinux.org/ASA-201803-10", "reference_id": "ASA-201803-10", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201803-10" }, { "reference_url": "https://security.archlinux.org/AVG-651", "reference_id": "AVG-651", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-651" }, { "reference_url": "https://security.gentoo.org/glsa/201805-07", "reference_id": "GLSA-201805-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201805-07" }, { "reference_url": "https://usn.ubuntu.com/3595-1/", "reference_id": "USN-3595-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3595-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038160?format=api", "purl": "pkg:deb/debian/samba@2:4.9.5%2Bdfsg-5%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-5%252Bdeb10u3" } ], "aliases": [ "CVE-2018-1057" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wbrt-6f84-p3gu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79404?format=api", "vulnerability_id": "VCID-wdp2-qcyp-eucu", "summary": "security update", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00050.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00050.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00106.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00106.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3880.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3880.json" }, { "reference_url": "https://access.redhat.com/security/cve/cve-2019-3880", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/security/cve/cve-2019-3880" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-3880", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03388", "scoring_system": "epss", "scoring_elements": "0.87346", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03388", "scoring_system": "epss", "scoring_elements": "0.8748", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.03388", "scoring_system": "epss", "scoring_elements": "0.87427", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03388", "scoring_system": "epss", "scoring_elements": "0.87434", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.03388", "scoring_system": "epss", "scoring_elements": "0.87449", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.03388", "scoring_system": "epss", "scoring_elements": "0.87462", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.03388", "scoring_system": "epss", "scoring_elements": "0.87356", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03388", "scoring_system": "epss", "scoring_elements": "0.87371", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03388", "scoring_system": "epss", "scoring_elements": "0.87389", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03388", "scoring_system": "epss", "scoring_elements": "0.87396", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03388", "scoring_system": "epss", "scoring_elements": "0.87408", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03388", "scoring_system": "epss", "scoring_elements": "0.87403", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03388", "scoring_system": "epss", "scoring_elements": "0.87399", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03388", "scoring_system": "epss", "scoring_elements": "0.87414", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03388", "scoring_system": "epss", "scoring_elements": "0.87417", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03388", "scoring_system": "epss", "scoring_elements": "0.87411", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-3880" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3880", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3880" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3880", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3880" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00013.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00013.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6354GALK73CZWQKFUG7AWB6EIEGFMF62/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6354GALK73CZWQKFUG7AWB6EIEGFMF62/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HSRLRO7BPRFETVFZ4TVJL2VFZEPHKJY4/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HSRLRO7BPRFETVFZ4TVJL2VFZEPHKJY4/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JTJVFA3RZ6G2IZDTVKLHRMX6QBYA4GPA/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JTJVFA3RZ6G2IZDTVKLHRMX6QBYA4GPA/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190411-0004/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20190411-0004/" }, { "reference_url": "https://support.f5.com/csp/article/K20804356", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.f5.com/csp/article/K20804356" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2019-3880.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.samba.org/samba/security/CVE-2019-3880.html" }, { "reference_url": "https://www.synology.com/security/advisory/Synology_SA_19_15", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.synology.com/security/advisory/Synology_SA_19_15" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1691518", "reference_id": "1691518", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1691518" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:gluster_storage:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:gluster_storage:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:gluster_storage:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3880", "reference_id": "CVE-2019-3880", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:P/A:P" }, { "value": "4.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" }, { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3880" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1966", "reference_id": "RHSA-2019:1966", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1966" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1967", "reference_id": "RHSA-2019:1967", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1967" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2099", "reference_id": "RHSA-2019:2099", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2099" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3582", "reference_id": "RHSA-2019:3582", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3582" }, { "reference_url": "https://usn.ubuntu.com/3939-1/", "reference_id": "USN-3939-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3939-1/" }, { "reference_url": "https://usn.ubuntu.com/3939-2/", "reference_id": "USN-3939-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3939-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038160?format=api", "purl": "pkg:deb/debian/samba@2:4.9.5%2Bdfsg-5%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-5%252Bdeb10u3" } ], "aliases": [ "CVE-2019-3880" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wdp2-qcyp-eucu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79829?format=api", "vulnerability_id": "VCID-wfhc-ehpe-abaq", "summary": "samba: Symlink race error can allow directory creation outside of the exported share", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43566.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43566.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-43566", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58129", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58215", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58235", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.5821", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58264", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58269", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58287", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58263", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58243", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58275", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58277", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58252", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58217", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.5823", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58216", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.5818", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58221", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58282", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-43566" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43566" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004691", "reference_id": "1004691", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004691" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2009676", "reference_id": "2009676", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2009676" }, { "reference_url": "https://usn.ubuntu.com/5260-1/", "reference_id": "USN-5260-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5260-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6" } ], "aliases": [ "CVE-2021-43566" ], "risk_score": 1.1, "exploitability": "0.5", "weighted_severity": "2.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wfhc-ehpe-abaq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47956?format=api", "vulnerability_id": "VCID-wpvs-jabz-2ye3", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16841.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16841.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16841", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.91489", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.91592", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.91569", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.91582", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.91496", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.91503", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.9151", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.91524", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.9153", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.91535", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.91536", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.91534", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.91557", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.91552", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.9156", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.91558", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14629", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14629" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16841", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16851" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1642545", "reference_id": "1642545", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1642545" }, { "reference_url": "https://security.archlinux.org/ASA-201811-22", "reference_id": "ASA-201811-22", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201811-22" }, { "reference_url": "https://security.archlinux.org/AVG-823", "reference_id": "AVG-823", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-823" }, { "reference_url": "https://security.gentoo.org/glsa/202003-52", "reference_id": "GLSA-202003-52", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-52" }, { "reference_url": "https://usn.ubuntu.com/3827-1/", "reference_id": "USN-3827-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3827-1/" }, { "reference_url": "https://usn.ubuntu.com/3827-2/", "reference_id": "USN-3827-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3827-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038160?format=api", "purl": "pkg:deb/debian/samba@2:4.9.5%2Bdfsg-5%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-5%252Bdeb10u3" } ], "aliases": [ "CVE-2018-16841" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wpvs-jabz-2ye3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80058?format=api", "vulnerability_id": "VCID-ws2g-8ye2-pkdk", "summary": "samba: Null pointer dereference on missing sname in TGS-REQ", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3671.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3671.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3671", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03013", "scoring_system": "epss", "scoring_elements": "0.86538", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03013", "scoring_system": "epss", "scoring_elements": "0.86691", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.03013", "scoring_system": "epss", "scoring_elements": "0.86657", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.03013", "scoring_system": "epss", "scoring_elements": "0.86675", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.03013", "scoring_system": "epss", "scoring_elements": "0.86548", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03013", "scoring_system": "epss", "scoring_elements": "0.86567", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03013", "scoring_system": "epss", "scoring_elements": "0.86568", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03013", "scoring_system": "epss", "scoring_elements": "0.86586", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03013", "scoring_system": "epss", "scoring_elements": "0.86596", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03013", "scoring_system": "epss", "scoring_elements": "0.8661", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03013", "scoring_system": "epss", "scoring_elements": "0.86607", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03013", "scoring_system": "epss", "scoring_elements": "0.86599", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03013", "scoring_system": "epss", "scoring_elements": "0.86613", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03013", "scoring_system": "epss", "scoring_elements": "0.86618", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03013", "scoring_system": "epss", "scoring_elements": "0.86628", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03013", "scoring_system": "epss", "scoring_elements": "0.86637", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.03013", "scoring_system": "epss", "scoring_elements": "0.86636", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013080", "reference_id": "2013080", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013080" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=996586", "reference_id": "996586", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=996586" }, { "reference_url": "https://security.archlinux.org/AVG-2418", "reference_id": "AVG-2418", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2418" }, { "reference_url": "https://usn.ubuntu.com/5142-1/", "reference_id": "USN-5142-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5142-1/" }, { "reference_url": "https://usn.ubuntu.com/5174-1/", "reference_id": "USN-5174-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5174-1/" }, { "reference_url": "https://usn.ubuntu.com/5675-1/", "reference_id": "USN-5675-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5675-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6" } ], "aliases": [ "CVE-2021-3671" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ws2g-8ye2-pkdk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48496?format=api", "vulnerability_id": "VCID-xwke-mduk-kyga", "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32744.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32744.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32744", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00424", "scoring_system": "epss", "scoring_elements": "0.62128", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64792", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.6475", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64799", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64814", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64831", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.6482", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.6483", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64841", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64828", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64787", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00516", "scoring_system": "epss", "scoring_elements": "0.66717", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00516", "scoring_system": "epss", "scoring_elements": "0.66691", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00516", "scoring_system": "epss", "scoring_elements": "0.66736", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00516", "scoring_system": "epss", "scoring_elements": "0.66776", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00516", "scoring_system": "epss", "scoring_elements": "0.66704", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00516", "scoring_system": "epss", "scoring_elements": "0.66718", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32744" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449", "reference_id": "1016449", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108205", "reference_id": "2108205", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108205" }, { "reference_url": "https://security.archlinux.org/AVG-2782", "reference_id": "AVG-2782", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2782" }, { "reference_url": "https://security.gentoo.org/glsa/202309-06", "reference_id": "GLSA-202309-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202309-06" }, { "reference_url": "https://usn.ubuntu.com/5542-1/", "reference_id": "USN-5542-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5542-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6" } ], "aliases": [ "CVE-2022-32744" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xwke-mduk-kyga" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47968?format=api", "vulnerability_id": "VCID-xyfs-p969-syfp", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19344.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19344.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19344", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02193", "scoring_system": "epss", "scoring_elements": "0.84521", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.02193", "scoring_system": "epss", "scoring_elements": "0.8446", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02193", "scoring_system": "epss", "scoring_elements": "0.84479", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.02193", "scoring_system": "epss", "scoring_elements": "0.84505", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.02308", "scoring_system": "epss", "scoring_elements": "0.84719", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02308", "scoring_system": "epss", "scoring_elements": "0.84742", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02308", "scoring_system": "epss", "scoring_elements": "0.84749", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02308", "scoring_system": "epss", "scoring_elements": "0.84767", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02308", "scoring_system": "epss", "scoring_elements": "0.84763", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02308", "scoring_system": "epss", "scoring_elements": "0.84757", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02308", "scoring_system": "epss", "scoring_elements": "0.84779", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02308", "scoring_system": "epss", "scoring_elements": "0.8478", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02308", "scoring_system": "epss", "scoring_elements": "0.84778", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02308", "scoring_system": "epss", "scoring_elements": "0.84805", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02308", "scoring_system": "epss", "scoring_elements": "0.84815", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02308", "scoring_system": "epss", "scoring_elements": "0.84683", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02308", "scoring_system": "epss", "scoring_elements": "0.8472", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02308", "scoring_system": "epss", "scoring_elements": "0.84698", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19344" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19344", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19344" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1791204", "reference_id": "1791204", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1791204" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=950499", "reference_id": "950499", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=950499" }, { "reference_url": "https://security.gentoo.org/glsa/202003-52", "reference_id": "GLSA-202003-52", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-52" }, { "reference_url": "https://usn.ubuntu.com/4244-1/", "reference_id": "USN-4244-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4244-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6" } ], "aliases": [ "CVE-2019-19344" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xyfs-p969-syfp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47962?format=api", "vulnerability_id": "VCID-ycau-9h17-quf3", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could lead to remote code execution.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00045.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00045.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10197.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10197.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10197", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0479", "scoring_system": "epss", "scoring_elements": "0.89441", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0479", "scoring_system": "epss", "scoring_elements": "0.8955", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0479", "scoring_system": "epss", "scoring_elements": "0.89509", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0479", "scoring_system": "epss", "scoring_elements": "0.8951", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0479", "scoring_system": "epss", "scoring_elements": "0.89518", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0479", "scoring_system": "epss", "scoring_elements": "0.89536", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0479", "scoring_system": "epss", "scoring_elements": "0.89445", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0479", "scoring_system": "epss", "scoring_elements": "0.89455", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0479", "scoring_system": "epss", "scoring_elements": "0.89457", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0479", "scoring_system": "epss", "scoring_elements": "0.89473", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0479", "scoring_system": "epss", "scoring_elements": "0.89477", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0479", "scoring_system": "epss", "scoring_elements": "0.89486", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0479", "scoring_system": "epss", "scoring_elements": "0.89484", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0479", "scoring_system": "epss", "scoring_elements": "0.89479", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0479", "scoring_system": "epss", "scoring_elements": "0.89493", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0479", "scoring_system": "epss", "scoring_elements": "0.89491", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0479", "scoring_system": "epss", "scoring_elements": "0.89505", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10197" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10197", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10197" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10197", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10197" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/56ZUXHGDHPM7S6RVAKULZT5EATS37OKA/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/56ZUXHGDHPM7S6RVAKULZT5EATS37OKA/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7NYIUZOCIDXWXGWMZ7O5Z7OJ6IX7EAB/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7NYIUZOCIDXWXGWMZ7O5Z7OJ6IX7EAB/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z6EEKFT24DQI4DMZMSQTLMNZWG4RMZ57/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z6EEKFT24DQI4DMZMSQTLMNZWG4RMZ57/" }, { "reference_url": "https://seclists.org/bugtraq/2019/Sep/4", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2019/Sep/4" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190903-0001/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20190903-0001/" }, { "reference_url": "https://support.f5.com/csp/article/K69511801", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.f5.com/csp/article/K69511801" }, { "reference_url": "https://support.f5.com/csp/article/K69511801?utm_source=f5support&%3Butm_medium=RSS", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.f5.com/csp/article/K69511801?utm_source=f5support&%3Butm_medium=RSS" }, { "reference_url": "https://www.debian.org/security/2019/dsa-4513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2019/dsa-4513" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2019-10197.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.samba.org/samba/security/CVE-2019-10197.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1746225", "reference_id": "1746225", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1746225" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.10.0:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.10.0:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.10.0:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.10.0:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.10.0:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.10.0:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.10.0:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.10.0:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.10.0:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.10.0:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.10.0:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.10.0:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.11.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.11.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.11.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.11.0:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.11.0:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.11.0:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.11.0:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.11.0:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.11.0:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.11.0:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.11.0:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.11.0:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.9.0:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.9.0:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.9.0:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.9.0:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.9.0:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.9.0:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.9.0:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.9.0:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.9.0:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.9.0:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.9.0:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.9.0:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.9.0:rc5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.9.0:rc5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.9.0:rc5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10197", "reference_id": "CVE-2019-10197", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:N" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" }, { "value": "9.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10197" }, { "reference_url": "https://security.gentoo.org/glsa/202003-52", "reference_id": "GLSA-202003-52", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-52" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3253", "reference_id": "RHSA-2019:3253", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3253" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:4023", "reference_id": "RHSA-2019:4023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:4023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1084", "reference_id": "RHSA-2020:1084", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1084" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1878", "reference_id": "RHSA-2020:1878", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1878" }, { "reference_url": "https://usn.ubuntu.com/4121-1/", "reference_id": "USN-4121-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4121-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038160?format=api", "purl": "pkg:deb/debian/samba@2:4.9.5%2Bdfsg-5%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-5%252Bdeb10u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6" } ], "aliases": [ "CVE-2019-10197" ], "risk_score": 4.1, "exploitability": "0.5", "weighted_severity": "8.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ycau-9h17-quf3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47951?format=api", "vulnerability_id": "VCID-ycm6-j6gt-p7ar", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10918.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10918.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10918", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04257", "scoring_system": "epss", "scoring_elements": "0.88761", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04257", "scoring_system": "epss", "scoring_elements": "0.88769", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04257", "scoring_system": "epss", "scoring_elements": "0.88785", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04257", "scoring_system": "epss", "scoring_elements": "0.88787", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04257", "scoring_system": "epss", "scoring_elements": "0.88804", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04257", "scoring_system": "epss", "scoring_elements": "0.8881", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04257", "scoring_system": "epss", "scoring_elements": "0.88822", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04257", "scoring_system": "epss", "scoring_elements": "0.88816", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04257", "scoring_system": "epss", "scoring_elements": "0.88831", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04257", "scoring_system": "epss", "scoring_elements": "0.88829", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04257", "scoring_system": "epss", "scoring_elements": "0.88826", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04257", "scoring_system": "epss", "scoring_elements": "0.88842", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.04257", "scoring_system": "epss", "scoring_elements": "0.88848", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.04257", "scoring_system": "epss", "scoring_elements": "0.88857", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.04257", "scoring_system": "epss", "scoring_elements": "0.88874", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.04257", "scoring_system": "epss", "scoring_elements": "0.88886", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10918" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10918", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10918" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610640", "reference_id": "1610640", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610640" }, { "reference_url": "https://security.gentoo.org/glsa/202003-52", "reference_id": "GLSA-202003-52", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-52" }, { "reference_url": "https://usn.ubuntu.com/3738-1/", "reference_id": "USN-3738-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3738-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038160?format=api", "purl": "pkg:deb/debian/samba@2:4.9.5%2Bdfsg-5%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-5%252Bdeb10u3" } ], "aliases": [ "CVE-2018-10918" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ycm6-j6gt-p7ar" } ], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47961?format=api", "vulnerability_id": "VCID-21hz-xvek-73cd", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16860.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16860.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16860", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83706", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83719", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83734", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83736", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.8376", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83767", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83783", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83777", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83772", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83806", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83807", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83808", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83833", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83841", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83846", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83868", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83889", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83905", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16860" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16860", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16860" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705877", "reference_id": "1705877", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705877" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928966", "reference_id": "928966", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928966" }, { "reference_url": "https://security.gentoo.org/glsa/202003-52", "reference_id": "GLSA-202003-52", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-52" }, { "reference_url": "https://usn.ubuntu.com/3976-1/", "reference_id": "USN-3976-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3976-1/" }, { "reference_url": "https://usn.ubuntu.com/3976-2/", "reference_id": "USN-3976-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3976-2/" }, { "reference_url": "https://usn.ubuntu.com/5675-1/", "reference_id": "USN-5675-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5675-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036930?format=api", "purl": "pkg:deb/debian/samba@2:4.5.16%2Bdfsg-1%2Bdeb9u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.5.16%252Bdfsg-1%252Bdeb9u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038160?format=api", "purl": "pkg:deb/debian/samba@2:4.9.5%2Bdfsg-5%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-5%252Bdeb10u3" } ], "aliases": [ "CVE-2018-16860" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-21hz-xvek-73cd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63875?format=api", "vulnerability_id": "VCID-29k5-64fs-ufcd", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12150.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12150.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12150", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.19902", "scoring_system": "epss", "scoring_elements": "0.95421", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.19902", "scoring_system": "epss", "scoring_elements": "0.95499", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.19902", "scoring_system": "epss", "scoring_elements": "0.95485", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.19902", "scoring_system": "epss", "scoring_elements": "0.95492", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.19902", "scoring_system": "epss", "scoring_elements": "0.95429", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.19902", "scoring_system": "epss", "scoring_elements": "0.95436", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.19902", "scoring_system": "epss", "scoring_elements": "0.95439", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.19902", "scoring_system": "epss", "scoring_elements": "0.95446", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.19902", "scoring_system": "epss", "scoring_elements": "0.95448", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.19902", "scoring_system": "epss", "scoring_elements": "0.95453", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.19902", "scoring_system": "epss", "scoring_elements": "0.95454", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.19902", "scoring_system": "epss", "scoring_elements": "0.95463", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.19902", "scoring_system": "epss", "scoring_elements": "0.95468", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.19902", "scoring_system": "epss", "scoring_elements": "0.95472", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.19902", "scoring_system": "epss", "scoring_elements": "0.95473", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.19902", "scoring_system": "epss", "scoring_elements": "0.95475", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12150" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12150", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12150" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12151", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12151" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12163", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12163" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:H/Au:N/C:C/I:C/A:N" }, { "value": "8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1488400", "reference_id": "1488400", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1488400" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2789", "reference_id": "RHSA-2017:2789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2790", "reference_id": "RHSA-2017:2790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2791", "reference_id": "RHSA-2017:2791", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2791" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2858", "reference_id": "RHSA-2017:2858", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2858" }, { "reference_url": "https://usn.ubuntu.com/3426-1/", "reference_id": "USN-3426-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3426-1/" }, { "reference_url": "https://usn.ubuntu.com/3426-2/", "reference_id": "USN-3426-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3426-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035709?format=api", "purl": "pkg:deb/debian/samba@2:4.2.14%2Bdfsg-0%2Bdeb8u9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-2q9w-nvzs-g7cp" }, { "vulnerability": "VCID-364y-r11r-u7cm" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4mdk-6qnf-r7f7" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-4v8q-akyc-k7hn" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-66cs-n3ad-efgy" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-8uqh-s6xh-vycb" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9smc-af63-x7cg" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-a653-r4dy-bba9" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-e3gq-5a8s-akh4" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-jd7n-tjpq-3uc9" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-p33p-zg9p-nyfy" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qvhg-pkpb-sbcy" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-sgp8-b3jx-cbh5" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-w3qg-p74x-jbff" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wk1w-4jdv-wqhn" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xjqj-hy9t-nfb7" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" }, { "vulnerability": "VCID-zrfg-a5m3-jkf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.2.14%252Bdfsg-0%252Bdeb8u9" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036930?format=api", "purl": "pkg:deb/debian/samba@2:4.5.16%2Bdfsg-1%2Bdeb9u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.5.16%252Bdfsg-1%252Bdeb9u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038160?format=api", "purl": "pkg:deb/debian/samba@2:4.9.5%2Bdfsg-5%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-5%252Bdeb10u3" } ], "aliases": [ "CVE-2017-12150" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-29k5-64fs-ufcd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84495?format=api", "vulnerability_id": "VCID-2q9w-nvzs-g7cp", "summary": "samba: symlink race permits opening files outside share directory", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2619.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2619.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2619", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.40665", "scoring_system": "epss", "scoring_elements": "0.97341", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.40665", "scoring_system": "epss", "scoring_elements": "0.97347", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.40665", "scoring_system": "epss", "scoring_elements": "0.97351", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.40665", "scoring_system": "epss", "scoring_elements": "0.97352", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.40665", "scoring_system": "epss", "scoring_elements": "0.97359", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.40665", "scoring_system": "epss", "scoring_elements": "0.9736", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.40665", "scoring_system": "epss", "scoring_elements": "0.97362", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.40665", "scoring_system": "epss", "scoring_elements": "0.97363", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.40665", "scoring_system": "epss", "scoring_elements": "0.97371", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.40665", "scoring_system": "epss", "scoring_elements": "0.97374", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.40665", "scoring_system": "epss", "scoring_elements": "0.97375", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.40665", "scoring_system": "epss", "scoring_elements": "0.97376", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.40665", "scoring_system": "epss", "scoring_elements": "0.9738", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.40665", "scoring_system": "epss", "scoring_elements": "0.97383", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.40665", "scoring_system": "epss", "scoring_elements": "0.97388", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.40665", "scoring_system": "epss", "scoring_elements": "0.97392", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2619" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2619", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2619" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.8", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:S/C:C/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1429472", "reference_id": "1429472", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1429472" }, { "reference_url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1039", "reference_id": "CVE-2017-2619", "reference_type": "exploit", "scores": [], "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1039" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/41740.txt", "reference_id": "CVE-2017-2619", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/41740.txt" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1265", "reference_id": "RHSA-2017:1265", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1265" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2338", "reference_id": "RHSA-2017:2338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2338" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2778", "reference_id": "RHSA-2017:2778", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2778" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2789", "reference_id": "RHSA-2017:2789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2789" }, { "reference_url": "https://usn.ubuntu.com/3242-1/", "reference_id": "USN-3242-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3242-1/" }, { "reference_url": "https://usn.ubuntu.com/3267-1/", "reference_id": "USN-3267-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3267-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035709?format=api", "purl": "pkg:deb/debian/samba@2:4.2.14%2Bdfsg-0%2Bdeb8u9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-2q9w-nvzs-g7cp" }, { "vulnerability": "VCID-364y-r11r-u7cm" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4mdk-6qnf-r7f7" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-4v8q-akyc-k7hn" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-66cs-n3ad-efgy" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-8uqh-s6xh-vycb" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9smc-af63-x7cg" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-a653-r4dy-bba9" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-e3gq-5a8s-akh4" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-jd7n-tjpq-3uc9" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-p33p-zg9p-nyfy" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qvhg-pkpb-sbcy" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-sgp8-b3jx-cbh5" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-w3qg-p74x-jbff" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wk1w-4jdv-wqhn" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xjqj-hy9t-nfb7" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" }, { "vulnerability": "VCID-zrfg-a5m3-jkf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.2.14%252Bdfsg-0%252Bdeb8u9" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036930?format=api", "purl": "pkg:deb/debian/samba@2:4.5.16%2Bdfsg-1%2Bdeb9u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.5.16%252Bdfsg-1%252Bdeb9u2" } ], "aliases": [ "CVE-2017-2619" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2q9w-nvzs-g7cp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50099?format=api", "vulnerability_id": "VCID-364y-r11r-u7cm", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which may allow execution of arbitrary code with root privileges.", "references": [ { "reference_url": "http://badlock.org/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://badlock.org/" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0611.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0611.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0613.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0613.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0619.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0619.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0624.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0624.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2112.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2112.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2112", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.16609", "scoring_system": "epss", "scoring_elements": "0.94963", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.16609", "scoring_system": "epss", "scoring_elements": "0.94953", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.16609", "scoring_system": "epss", "scoring_elements": "0.94946", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.19642", "scoring_system": "epss", "scoring_elements": "0.95404", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.19642", "scoring_system": "epss", "scoring_elements": "0.95411", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.19642", "scoring_system": "epss", "scoring_elements": "0.95414", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.19642", "scoring_system": "epss", "scoring_elements": "0.95386", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.19642", "scoring_system": "epss", "scoring_elements": "0.95421", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.19642", "scoring_system": "epss", "scoring_elements": "0.95429", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.19642", "scoring_system": "epss", "scoring_elements": "0.95433", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.19642", "scoring_system": "epss", "scoring_elements": "0.95437", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.19642", "scoring_system": "epss", "scoring_elements": "0.95438", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.19642", "scoring_system": "epss", "scoring_elements": "0.95439", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.19642", "scoring_system": "epss", "scoring_elements": "0.95419", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.19642", "scoring_system": "epss", "scoring_elements": "0.95395", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.19642", "scoring_system": "epss", "scoring_elements": "0.95401", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2112" }, { "reference_url": "https://bto.bluecoat.com/security-advisory/sa122", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bto.bluecoat.com/security-advisory/sa122" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2114", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2114" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:M/Au:N/C:P/I:P/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05087821", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05087821" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05082964", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05082964" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399" }, { "reference_url": "https://www.samba.org/samba/history/samba-4.2.10.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.samba.org/samba/history/samba-4.2.10.html" }, { "reference_url": "https://www.samba.org/samba/latest_news.html#4.4.2", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.samba.org/samba/latest_news.html#4.4.2" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2016-2112.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.samba.org/samba/security/CVE-2016-2112.html" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3548", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3548" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "reference_url": "http://www.securitytracker.com/id/1035533", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035533" }, { "reference_url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.458012", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.458012" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2950-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2950-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2950-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2950-2" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2950-3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2950-3" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2950-4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2950-4" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2950-5", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2950-5" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1311903", "reference_id": "1311903", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1311903" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.24:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.24:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.24:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.25:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.25:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.25:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.25:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.25:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.25:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.26:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.26:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.26:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2112", "reference_id": "CVE-2016-2112", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" }, { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2112" }, { "reference_url": "https://security.gentoo.org/glsa/201612-47", "reference_id": "GLSA-201612-47", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201612-47" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0611", "reference_id": "RHSA-2016:0611", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0611" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0612", "reference_id": "RHSA-2016:0612", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0612" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0613", "reference_id": "RHSA-2016:0613", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0613" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0614", "reference_id": "RHSA-2016:0614", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0614" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0618", "reference_id": "RHSA-2016:0618", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0618" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0619", "reference_id": "RHSA-2016:0619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0619" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0620", "reference_id": "RHSA-2016:0620", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0620" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0624", "reference_id": "RHSA-2016:0624", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0624" }, { "reference_url": "https://usn.ubuntu.com/2950-1/", "reference_id": "USN-2950-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2950-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571326?format=api", "purl": "pkg:deb/debian/samba@2:4.1.11%2Bdfsg-1~bpo70%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-26kr-61ku-ufe2" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-2q9w-nvzs-g7cp" }, { "vulnerability": "VCID-364y-r11r-u7cm" }, { "vulnerability": "VCID-45rp-gyp5-ukfb" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4mdk-6qnf-r7f7" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-4v8q-akyc-k7hn" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-66cs-n3ad-efgy" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-7xaa-6397-eyby" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-8uqh-s6xh-vycb" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9smc-af63-x7cg" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-a653-r4dy-bba9" }, { "vulnerability": "VCID-c9k2-wjf4-gbg6" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-e3gq-5a8s-akh4" }, { "vulnerability": "VCID-esjb-wmzz-fuc7" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fc2s-dwmh-w3gf" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-jd7n-tjpq-3uc9" }, { "vulnerability": "VCID-kkgp-9x4z-gue3" }, { "vulnerability": "VCID-kx2z-r7z8-qffr" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-p33p-zg9p-nyfy" }, { "vulnerability": "VCID-q3qf-qtjv-cyat" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qvhg-pkpb-sbcy" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-r6dg-tbre-5fer" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-sgp8-b3jx-cbh5" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tan8-tfz4-eudy" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vjmz-bp2f-bbc1" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-w3qg-p74x-jbff" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wk1w-4jdv-wqhn" }, { "vulnerability": "VCID-wm2r-x7yy-sbhb" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xjqj-hy9t-nfb7" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" }, { "vulnerability": "VCID-zrfg-a5m3-jkf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.1.11%252Bdfsg-1~bpo70%252B1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035709?format=api", "purl": "pkg:deb/debian/samba@2:4.2.14%2Bdfsg-0%2Bdeb8u9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-2q9w-nvzs-g7cp" }, { "vulnerability": "VCID-364y-r11r-u7cm" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4mdk-6qnf-r7f7" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-4v8q-akyc-k7hn" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-66cs-n3ad-efgy" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-8uqh-s6xh-vycb" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9smc-af63-x7cg" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-a653-r4dy-bba9" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-e3gq-5a8s-akh4" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-jd7n-tjpq-3uc9" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-p33p-zg9p-nyfy" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qvhg-pkpb-sbcy" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-sgp8-b3jx-cbh5" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-w3qg-p74x-jbff" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wk1w-4jdv-wqhn" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xjqj-hy9t-nfb7" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" }, { "vulnerability": "VCID-zrfg-a5m3-jkf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.2.14%252Bdfsg-0%252Bdeb8u9" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036930?format=api", "purl": "pkg:deb/debian/samba@2:4.5.16%2Bdfsg-1%2Bdeb9u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.5.16%252Bdfsg-1%252Bdeb9u2" } ], "aliases": [ "CVE-2016-2112" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-364y-r11r-u7cm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50101?format=api", "vulnerability_id": "VCID-4mdk-6qnf-r7f7", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which may allow execution of arbitrary code with root privileges.", "references": [ { "reference_url": "http://badlock.org/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://badlock.org/" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2114.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2114.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2114", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05863", "scoring_system": "epss", "scoring_elements": "0.90619", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.05863", "scoring_system": "epss", "scoring_elements": "0.906", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.05863", "scoring_system": "epss", "scoring_elements": "0.90631", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.09085", "scoring_system": "epss", "scoring_elements": "0.92636", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.09085", "scoring_system": "epss", "scoring_elements": "0.92647", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.09085", "scoring_system": "epss", "scoring_elements": "0.92622", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.09085", "scoring_system": "epss", "scoring_elements": "0.92656", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.09085", "scoring_system": "epss", "scoring_elements": "0.92669", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.09085", "scoring_system": "epss", "scoring_elements": "0.92673", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.09085", "scoring_system": "epss", "scoring_elements": "0.92674", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.09085", "scoring_system": "epss", "scoring_elements": "0.92671", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.09085", "scoring_system": "epss", "scoring_elements": "0.92651", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.09085", "scoring_system": "epss", "scoring_elements": "0.92629", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.09085", "scoring_system": "epss", "scoring_elements": "0.92635", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2114" }, { "reference_url": "https://bto.bluecoat.com/security-advisory/sa122", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bto.bluecoat.com/security-advisory/sa122" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2114", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2114" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.samba.org/samba/history/samba-4.2.10.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.samba.org/samba/history/samba-4.2.10.html" }, { "reference_url": "https://www.samba.org/samba/latest_news.html#4.4.2", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.samba.org/samba/latest_news.html#4.4.2" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2016-2114.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.samba.org/samba/security/CVE-2016-2114.html" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3548", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3548" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "reference_url": "http://www.securityfocus.com/bid/86011", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/86011" }, { "reference_url": "http://www.securitytracker.com/id/1035533", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035533" }, { "reference_url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.458012", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.458012" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2950-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2950-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2950-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2950-2" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2950-3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2950-3" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2950-4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2950-4" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2950-5", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2950-5" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312082", "reference_id": "1312082", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312082" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.25:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.25:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.25:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.26:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.26:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.26:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2114", "reference_id": "CVE-2016-2114", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" }, { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2114" }, { "reference_url": "https://security.gentoo.org/glsa/201612-47", "reference_id": "GLSA-201612-47", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201612-47" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0612", "reference_id": "RHSA-2016:0612", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0612" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0614", "reference_id": "RHSA-2016:0614", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0614" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0618", "reference_id": "RHSA-2016:0618", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0618" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0620", "reference_id": "RHSA-2016:0620", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0620" }, { "reference_url": "https://usn.ubuntu.com/2950-1/", "reference_id": "USN-2950-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2950-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571326?format=api", "purl": "pkg:deb/debian/samba@2:4.1.11%2Bdfsg-1~bpo70%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-26kr-61ku-ufe2" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-2q9w-nvzs-g7cp" }, { "vulnerability": "VCID-364y-r11r-u7cm" }, { "vulnerability": "VCID-45rp-gyp5-ukfb" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4mdk-6qnf-r7f7" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-4v8q-akyc-k7hn" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-66cs-n3ad-efgy" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-7xaa-6397-eyby" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-8uqh-s6xh-vycb" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9smc-af63-x7cg" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-a653-r4dy-bba9" }, { "vulnerability": "VCID-c9k2-wjf4-gbg6" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-e3gq-5a8s-akh4" }, { "vulnerability": "VCID-esjb-wmzz-fuc7" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fc2s-dwmh-w3gf" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-jd7n-tjpq-3uc9" }, { "vulnerability": "VCID-kkgp-9x4z-gue3" }, { "vulnerability": "VCID-kx2z-r7z8-qffr" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-p33p-zg9p-nyfy" }, { "vulnerability": "VCID-q3qf-qtjv-cyat" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qvhg-pkpb-sbcy" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-r6dg-tbre-5fer" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-sgp8-b3jx-cbh5" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tan8-tfz4-eudy" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vjmz-bp2f-bbc1" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-w3qg-p74x-jbff" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wk1w-4jdv-wqhn" }, { "vulnerability": "VCID-wm2r-x7yy-sbhb" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xjqj-hy9t-nfb7" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" }, { "vulnerability": "VCID-zrfg-a5m3-jkf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.1.11%252Bdfsg-1~bpo70%252B1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035709?format=api", "purl": "pkg:deb/debian/samba@2:4.2.14%2Bdfsg-0%2Bdeb8u9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-2q9w-nvzs-g7cp" }, { "vulnerability": "VCID-364y-r11r-u7cm" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4mdk-6qnf-r7f7" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-4v8q-akyc-k7hn" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-66cs-n3ad-efgy" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-8uqh-s6xh-vycb" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9smc-af63-x7cg" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-a653-r4dy-bba9" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-e3gq-5a8s-akh4" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-jd7n-tjpq-3uc9" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-p33p-zg9p-nyfy" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qvhg-pkpb-sbcy" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-sgp8-b3jx-cbh5" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-w3qg-p74x-jbff" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wk1w-4jdv-wqhn" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xjqj-hy9t-nfb7" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" }, { "vulnerability": "VCID-zrfg-a5m3-jkf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.2.14%252Bdfsg-0%252Bdeb8u9" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036930?format=api", "purl": "pkg:deb/debian/samba@2:4.5.16%2Bdfsg-1%2Bdeb9u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.5.16%252Bdfsg-1%252Bdeb9u2" } ], "aliases": [ "CVE-2016-2114" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4mdk-6qnf-r7f7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61604?format=api", "vulnerability_id": "VCID-4v8q-akyc-k7hn", "summary": "security update", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178730.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178730.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178764.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178764.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/180000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/180000.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00063.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00063.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00064.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00064.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00065.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00065.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00081.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00081.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00090.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00090.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00092.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00092.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7560.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7560.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7560", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03995", "scoring_system": "epss", "scoring_elements": "0.88492", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.03995", "scoring_system": "epss", "scoring_elements": "0.88462", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.03995", "scoring_system": "epss", "scoring_elements": "0.88478", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.03995", "scoring_system": "epss", "scoring_elements": "0.8837", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03995", "scoring_system": "epss", "scoring_elements": "0.88379", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03995", "scoring_system": "epss", "scoring_elements": "0.88387", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03995", "scoring_system": "epss", "scoring_elements": "0.88392", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03995", "scoring_system": "epss", "scoring_elements": "0.88411", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03995", "scoring_system": "epss", "scoring_elements": "0.88417", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03995", "scoring_system": "epss", "scoring_elements": "0.88428", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03995", "scoring_system": "epss", "scoring_elements": "0.8842", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03995", "scoring_system": "epss", "scoring_elements": "0.88434", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03995", "scoring_system": "epss", "scoring_elements": "0.88431", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03995", "scoring_system": "epss", "scoring_elements": "0.88429", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03995", "scoring_system": "epss", "scoring_elements": "0.88445", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03995", "scoring_system": "epss", "scoring_elements": "0.8845", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7560" }, { "reference_url": "https://bugzilla.samba.org/show_bug.cgi?id=11648", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.samba.org/show_bug.cgi?id=11648" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7560", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7560" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0771", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0771" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:M/Au:S/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05121842", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05121842" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2015-7560.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.samba.org/samba/security/CVE-2015-7560.html" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3514", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3514" }, { "reference_url": "http://www.securityfocus.com/bid/84267", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/84267" }, { "reference_url": "http://www.securitytracker.com/id/1035220", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035220" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2922-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2922-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1309992", "reference_id": "1309992", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1309992" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.4.0:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.4.0:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.4.0:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7560", "reference_id": "CVE-2015-7560", "reference_type": "", "scores": [ { "value": "4.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:P/A:N" }, { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7560" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0447", "reference_id": "RHSA-2016:0447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0448", "reference_id": "RHSA-2016:0448", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0448" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0449", "reference_id": "RHSA-2016:0449", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0449" }, { "reference_url": "https://usn.ubuntu.com/2922-1/", "reference_id": "USN-2922-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2922-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571315?format=api", "purl": "pkg:deb/debian/samba@2:3.6.6-6%2Bdeb7u7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-26kr-61ku-ufe2" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-2q9w-nvzs-g7cp" }, { "vulnerability": "VCID-364y-r11r-u7cm" }, { "vulnerability": "VCID-3w4u-k81w-hued" }, { "vulnerability": "VCID-45rp-gyp5-ukfb" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4mdk-6qnf-r7f7" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-4v8q-akyc-k7hn" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-66cs-n3ad-efgy" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-7xaa-6397-eyby" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-8uqh-s6xh-vycb" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9smc-af63-x7cg" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-a653-r4dy-bba9" }, { "vulnerability": "VCID-c9k2-wjf4-gbg6" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-chw6-82ck-huhg" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-cu61-u4g4-kka7" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-e3gq-5a8s-akh4" }, { "vulnerability": "VCID-esjb-wmzz-fuc7" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fc2s-dwmh-w3gf" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-jc62-j5kx-hqdc" }, { "vulnerability": "VCID-jd7n-tjpq-3uc9" }, { "vulnerability": "VCID-jdu1-822a-rkbu" }, { "vulnerability": "VCID-kkgp-9x4z-gue3" }, { "vulnerability": "VCID-kx2z-r7z8-qffr" }, { "vulnerability": "VCID-ky5x-ujtx-fbe6" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-m5m4-8jr4-f3dz" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-p33p-zg9p-nyfy" }, { "vulnerability": "VCID-q3qf-qtjv-cyat" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qvhg-pkpb-sbcy" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-r6dg-tbre-5fer" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-sgp8-b3jx-cbh5" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tan8-tfz4-eudy" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-tvka-n7p1-nbec" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vjmz-bp2f-bbc1" }, { "vulnerability": "VCID-vk96-dpt8-2uav" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-w3qg-p74x-jbff" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wk1w-4jdv-wqhn" }, { "vulnerability": "VCID-wm2r-x7yy-sbhb" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-x3bk-7vqp-3qgy" }, { "vulnerability": "VCID-xjqj-hy9t-nfb7" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycdc-vg8w-6kew" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" }, { "vulnerability": "VCID-zrfg-a5m3-jkf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:3.6.6-6%252Bdeb7u7" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035709?format=api", "purl": "pkg:deb/debian/samba@2:4.2.14%2Bdfsg-0%2Bdeb8u9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-2q9w-nvzs-g7cp" }, { "vulnerability": "VCID-364y-r11r-u7cm" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4mdk-6qnf-r7f7" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-4v8q-akyc-k7hn" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-66cs-n3ad-efgy" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-8uqh-s6xh-vycb" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9smc-af63-x7cg" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-a653-r4dy-bba9" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-e3gq-5a8s-akh4" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-jd7n-tjpq-3uc9" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-p33p-zg9p-nyfy" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qvhg-pkpb-sbcy" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-sgp8-b3jx-cbh5" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-w3qg-p74x-jbff" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wk1w-4jdv-wqhn" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xjqj-hy9t-nfb7" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" }, { "vulnerability": "VCID-zrfg-a5m3-jkf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.2.14%252Bdfsg-0%252Bdeb8u9" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036930?format=api", "purl": "pkg:deb/debian/samba@2:4.5.16%2Bdfsg-1%2Bdeb9u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.5.16%252Bdfsg-1%252Bdeb9u2" } ], "aliases": [ "CVE-2015-7560" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4v8q-akyc-k7hn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63877?format=api", "vulnerability_id": "VCID-5kvv-rbas-tbh9", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12163.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12163.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12163", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.41375", "scoring_system": "epss", "scoring_elements": "0.97375", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.41375", "scoring_system": "epss", "scoring_elements": "0.97427", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.41375", "scoring_system": "epss", "scoring_elements": "0.9742", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.41375", "scoring_system": "epss", "scoring_elements": "0.97423", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.41375", "scoring_system": "epss", "scoring_elements": "0.97382", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.41375", "scoring_system": "epss", "scoring_elements": "0.97386", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.41375", "scoring_system": "epss", "scoring_elements": "0.97387", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.41375", "scoring_system": "epss", "scoring_elements": "0.97394", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.41375", "scoring_system": "epss", "scoring_elements": "0.97395", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.41375", "scoring_system": "epss", "scoring_elements": "0.97397", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.41375", "scoring_system": "epss", "scoring_elements": "0.97398", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.41375", "scoring_system": "epss", "scoring_elements": "0.97406", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.41375", "scoring_system": "epss", "scoring_elements": "0.97409", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.41375", "scoring_system": "epss", "scoring_elements": "0.9741", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.41375", "scoring_system": "epss", "scoring_elements": "0.97412", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.41375", "scoring_system": "epss", "scoring_elements": "0.97415", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12163" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12150", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12150" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12151", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12151" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12163", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12163" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:P/I:N/A:N" }, { "value": "5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1491206", "reference_id": "1491206", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1491206" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2789", "reference_id": "RHSA-2017:2789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2790", "reference_id": "RHSA-2017:2790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2791", "reference_id": "RHSA-2017:2791", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2791" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2858", "reference_id": "RHSA-2017:2858", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2858" }, { "reference_url": "https://usn.ubuntu.com/3426-1/", "reference_id": "USN-3426-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3426-1/" }, { "reference_url": "https://usn.ubuntu.com/3426-2/", "reference_id": "USN-3426-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3426-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035709?format=api", "purl": "pkg:deb/debian/samba@2:4.2.14%2Bdfsg-0%2Bdeb8u9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-2q9w-nvzs-g7cp" }, { "vulnerability": "VCID-364y-r11r-u7cm" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4mdk-6qnf-r7f7" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-4v8q-akyc-k7hn" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-66cs-n3ad-efgy" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-8uqh-s6xh-vycb" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9smc-af63-x7cg" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-a653-r4dy-bba9" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-e3gq-5a8s-akh4" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-jd7n-tjpq-3uc9" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-p33p-zg9p-nyfy" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qvhg-pkpb-sbcy" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-sgp8-b3jx-cbh5" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-w3qg-p74x-jbff" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wk1w-4jdv-wqhn" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xjqj-hy9t-nfb7" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" }, { "vulnerability": "VCID-zrfg-a5m3-jkf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.2.14%252Bdfsg-0%252Bdeb8u9" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036930?format=api", "purl": "pkg:deb/debian/samba@2:4.5.16%2Bdfsg-1%2Bdeb9u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.5.16%252Bdfsg-1%252Bdeb9u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038160?format=api", "purl": "pkg:deb/debian/samba@2:4.9.5%2Bdfsg-5%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-5%252Bdeb10u3" } ], "aliases": [ "CVE-2017-12163" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5kvv-rbas-tbh9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81501?format=api", "vulnerability_id": "VCID-66cs-n3ad-efgy", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2123.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2123.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2123", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75036", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75222", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.7517", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75198", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75038", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75067", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75044", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75078", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75089", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75112", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.7509", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.7508", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75118", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75125", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75115", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75153", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75157", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75161", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2123" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2119", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2119" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2123", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2123" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2125", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2125" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2126" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.9", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1392702", "reference_id": "1392702", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1392702" }, { "reference_url": "https://security.archlinux.org/ASA-201612-19", "reference_id": "ASA-201612-19", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201612-19" }, { "reference_url": "https://security.archlinux.org/AVG-111", "reference_id": "AVG-111", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-111" }, { "reference_url": "https://usn.ubuntu.com/3158-1/", "reference_id": "USN-3158-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3158-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035709?format=api", "purl": "pkg:deb/debian/samba@2:4.2.14%2Bdfsg-0%2Bdeb8u9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-2q9w-nvzs-g7cp" }, { "vulnerability": "VCID-364y-r11r-u7cm" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4mdk-6qnf-r7f7" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-4v8q-akyc-k7hn" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-66cs-n3ad-efgy" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-8uqh-s6xh-vycb" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9smc-af63-x7cg" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-a653-r4dy-bba9" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-e3gq-5a8s-akh4" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-jd7n-tjpq-3uc9" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-p33p-zg9p-nyfy" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qvhg-pkpb-sbcy" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-sgp8-b3jx-cbh5" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-w3qg-p74x-jbff" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wk1w-4jdv-wqhn" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xjqj-hy9t-nfb7" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" }, { "vulnerability": "VCID-zrfg-a5m3-jkf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.2.14%252Bdfsg-0%252Bdeb8u9" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036930?format=api", "purl": "pkg:deb/debian/samba@2:4.5.16%2Bdfsg-1%2Bdeb9u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.5.16%252Bdfsg-1%252Bdeb9u2" } ], "aliases": [ "CVE-2016-2123" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-66cs-n3ad-efgy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61271?format=api", "vulnerability_id": "VCID-8uqh-s6xh-vycb", "summary": "security update", "references": [ { "reference_url": "http://badlock.org/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://badlock.org/" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0611.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0611.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0613.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0613.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0619.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0619.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0624.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0624.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5370.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5370.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5370", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.21108", "scoring_system": "epss", "scoring_elements": "0.95687", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.21108", "scoring_system": "epss", "scoring_elements": "0.95695", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.21108", "scoring_system": "epss", "scoring_elements": "0.95689", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.25475", "scoring_system": "epss", "scoring_elements": "0.96201", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.25475", "scoring_system": "epss", "scoring_elements": "0.96211", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.25475", "scoring_system": "epss", "scoring_elements": "0.96214", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.25475", "scoring_system": "epss", "scoring_elements": "0.96218", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.25475", "scoring_system": "epss", "scoring_elements": "0.96181", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.25475", "scoring_system": "epss", "scoring_elements": "0.96219", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.25475", "scoring_system": "epss", "scoring_elements": "0.96228", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.25475", "scoring_system": "epss", "scoring_elements": "0.96232", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.25475", "scoring_system": "epss", "scoring_elements": "0.96233", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.25475", "scoring_system": "epss", "scoring_elements": "0.96234", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.25475", "scoring_system": "epss", "scoring_elements": "0.96235", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.25475", "scoring_system": "epss", "scoring_elements": "0.96236", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.25475", "scoring_system": "epss", "scoring_elements": "0.96217", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.25475", "scoring_system": "epss", "scoring_elements": "0.96189", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.25475", "scoring_system": "epss", "scoring_elements": "0.96197", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5370" }, { "reference_url": "https://bto.bluecoat.com/security-advisory/sa122", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bto.bluecoat.com/security-advisory/sa122" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2114", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2114" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:S/C:C/I:C/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399" }, { "reference_url": "https://www.samba.org/samba/history/samba-4.2.10.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.samba.org/samba/history/samba-4.2.10.html" }, { "reference_url": "https://www.samba.org/samba/latest_news.html#4.4.2", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.samba.org/samba/latest_news.html#4.4.2" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2015-5370.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.samba.org/samba/security/CVE-2015-5370.html" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3548", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3548" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "reference_url": "http://www.securitytracker.com/id/1035533", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035533" }, { "reference_url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.458012", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.458012" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2950-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2950-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2950-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2950-2" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2950-3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2950-3" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2950-4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2950-4" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2950-5", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2950-5" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1309987", "reference_id": "1309987", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1309987" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.24:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.24:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.24:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.25:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.25:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.25:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.25:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.25:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.25:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.26:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.26:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.26:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5370", "reference_id": "CVE-2015-5370", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" }, { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5370" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0611", "reference_id": "RHSA-2016:0611", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0611" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0612", "reference_id": "RHSA-2016:0612", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0612" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0613", "reference_id": "RHSA-2016:0613", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0613" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0614", "reference_id": "RHSA-2016:0614", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0614" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0618", "reference_id": "RHSA-2016:0618", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0618" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0619", "reference_id": "RHSA-2016:0619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0619" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0620", "reference_id": "RHSA-2016:0620", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0620" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0624", "reference_id": "RHSA-2016:0624", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0624" }, { "reference_url": "https://usn.ubuntu.com/2950-1/", "reference_id": "USN-2950-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2950-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571326?format=api", "purl": "pkg:deb/debian/samba@2:4.1.11%2Bdfsg-1~bpo70%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-26kr-61ku-ufe2" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-2q9w-nvzs-g7cp" }, { "vulnerability": "VCID-364y-r11r-u7cm" }, { "vulnerability": "VCID-45rp-gyp5-ukfb" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4mdk-6qnf-r7f7" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-4v8q-akyc-k7hn" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-66cs-n3ad-efgy" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-7xaa-6397-eyby" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-8uqh-s6xh-vycb" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9smc-af63-x7cg" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-a653-r4dy-bba9" }, { "vulnerability": "VCID-c9k2-wjf4-gbg6" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-e3gq-5a8s-akh4" }, { "vulnerability": "VCID-esjb-wmzz-fuc7" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fc2s-dwmh-w3gf" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-jd7n-tjpq-3uc9" }, { "vulnerability": "VCID-kkgp-9x4z-gue3" }, { "vulnerability": "VCID-kx2z-r7z8-qffr" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-p33p-zg9p-nyfy" }, { "vulnerability": "VCID-q3qf-qtjv-cyat" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qvhg-pkpb-sbcy" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-r6dg-tbre-5fer" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-sgp8-b3jx-cbh5" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tan8-tfz4-eudy" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vjmz-bp2f-bbc1" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-w3qg-p74x-jbff" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wk1w-4jdv-wqhn" }, { "vulnerability": "VCID-wm2r-x7yy-sbhb" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xjqj-hy9t-nfb7" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" }, { "vulnerability": "VCID-zrfg-a5m3-jkf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.1.11%252Bdfsg-1~bpo70%252B1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035709?format=api", "purl": "pkg:deb/debian/samba@2:4.2.14%2Bdfsg-0%2Bdeb8u9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-2q9w-nvzs-g7cp" }, { "vulnerability": "VCID-364y-r11r-u7cm" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4mdk-6qnf-r7f7" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-4v8q-akyc-k7hn" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-66cs-n3ad-efgy" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-8uqh-s6xh-vycb" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9smc-af63-x7cg" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-a653-r4dy-bba9" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-e3gq-5a8s-akh4" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-jd7n-tjpq-3uc9" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-p33p-zg9p-nyfy" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qvhg-pkpb-sbcy" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-sgp8-b3jx-cbh5" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-w3qg-p74x-jbff" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wk1w-4jdv-wqhn" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xjqj-hy9t-nfb7" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" }, { "vulnerability": "VCID-zrfg-a5m3-jkf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.2.14%252Bdfsg-0%252Bdeb8u9" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036930?format=api", "purl": "pkg:deb/debian/samba@2:4.5.16%2Bdfsg-1%2Bdeb9u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.5.16%252Bdfsg-1%252Bdeb9u2" } ], "aliases": [ "CVE-2015-5370" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8uqh-s6xh-vycb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50100?format=api", "vulnerability_id": "VCID-9smc-af63-x7cg", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which may allow execution of arbitrary code with root privileges.", "references": [ { "reference_url": "http://badlock.org/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://badlock.org/" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2113.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2113.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2113", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04197", "scoring_system": "epss", "scoring_elements": "0.88788", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.04197", "scoring_system": "epss", "scoring_elements": "0.8877", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.04197", "scoring_system": "epss", "scoring_elements": "0.888", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.06295", "scoring_system": "epss", "scoring_elements": "0.90924", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06295", "scoring_system": "epss", "scoring_elements": "0.90935", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06295", "scoring_system": "epss", "scoring_elements": "0.90942", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06295", "scoring_system": "epss", "scoring_elements": "0.9095", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06295", "scoring_system": "epss", "scoring_elements": "0.90899", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06295", "scoring_system": "epss", "scoring_elements": "0.90974", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.06295", "scoring_system": "epss", "scoring_elements": "0.90972", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.06295", "scoring_system": "epss", "scoring_elements": "0.90973", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.06295", "scoring_system": "epss", "scoring_elements": "0.90986", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.06295", "scoring_system": "epss", "scoring_elements": "0.90984", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.06295", "scoring_system": "epss", "scoring_elements": "0.9098", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.06295", "scoring_system": "epss", "scoring_elements": "0.90951", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.06295", "scoring_system": "epss", "scoring_elements": "0.90904", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06295", "scoring_system": "epss", "scoring_elements": "0.90914", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2113" }, { "reference_url": "https://bto.bluecoat.com/security-advisory/sa122", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bto.bluecoat.com/security-advisory/sa122" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2114", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2114" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:M/Au:N/C:P/I:P/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.samba.org/samba/history/samba-4.2.10.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.samba.org/samba/history/samba-4.2.10.html" }, { "reference_url": "https://www.samba.org/samba/latest_news.html#4.4.2", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.samba.org/samba/latest_news.html#4.4.2" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2016-2113.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.samba.org/samba/security/CVE-2016-2113.html" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3548", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3548" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "reference_url": "http://www.securitytracker.com/id/1035533", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035533" }, { "reference_url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.458012", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.458012" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2950-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2950-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2950-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2950-2" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2950-3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2950-3" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2950-4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2950-4" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2950-5", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2950-5" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1311910", "reference_id": "1311910", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1311910" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.25:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.25:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.25:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.26:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.26:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.26:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2113", "reference_id": "CVE-2016-2113", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:N" }, { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2113" }, { "reference_url": "https://security.gentoo.org/glsa/201612-47", "reference_id": "GLSA-201612-47", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201612-47" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0612", "reference_id": "RHSA-2016:0612", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0612" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0614", "reference_id": "RHSA-2016:0614", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0614" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0618", "reference_id": "RHSA-2016:0618", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0618" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0620", "reference_id": "RHSA-2016:0620", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0620" }, { "reference_url": "https://usn.ubuntu.com/2950-1/", "reference_id": "USN-2950-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2950-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571326?format=api", "purl": "pkg:deb/debian/samba@2:4.1.11%2Bdfsg-1~bpo70%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-26kr-61ku-ufe2" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-2q9w-nvzs-g7cp" }, { "vulnerability": "VCID-364y-r11r-u7cm" }, { "vulnerability": "VCID-45rp-gyp5-ukfb" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4mdk-6qnf-r7f7" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-4v8q-akyc-k7hn" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-66cs-n3ad-efgy" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-7xaa-6397-eyby" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-8uqh-s6xh-vycb" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9smc-af63-x7cg" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-a653-r4dy-bba9" }, { "vulnerability": "VCID-c9k2-wjf4-gbg6" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-e3gq-5a8s-akh4" }, { "vulnerability": "VCID-esjb-wmzz-fuc7" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fc2s-dwmh-w3gf" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-jd7n-tjpq-3uc9" }, { "vulnerability": "VCID-kkgp-9x4z-gue3" }, { "vulnerability": "VCID-kx2z-r7z8-qffr" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-p33p-zg9p-nyfy" }, { "vulnerability": "VCID-q3qf-qtjv-cyat" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qvhg-pkpb-sbcy" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-r6dg-tbre-5fer" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-sgp8-b3jx-cbh5" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tan8-tfz4-eudy" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vjmz-bp2f-bbc1" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-w3qg-p74x-jbff" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wk1w-4jdv-wqhn" }, { "vulnerability": "VCID-wm2r-x7yy-sbhb" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xjqj-hy9t-nfb7" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" }, { "vulnerability": "VCID-zrfg-a5m3-jkf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.1.11%252Bdfsg-1~bpo70%252B1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035709?format=api", "purl": "pkg:deb/debian/samba@2:4.2.14%2Bdfsg-0%2Bdeb8u9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-2q9w-nvzs-g7cp" }, { "vulnerability": "VCID-364y-r11r-u7cm" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4mdk-6qnf-r7f7" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-4v8q-akyc-k7hn" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-66cs-n3ad-efgy" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-8uqh-s6xh-vycb" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9smc-af63-x7cg" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-a653-r4dy-bba9" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-e3gq-5a8s-akh4" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-jd7n-tjpq-3uc9" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-p33p-zg9p-nyfy" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qvhg-pkpb-sbcy" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-sgp8-b3jx-cbh5" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-w3qg-p74x-jbff" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wk1w-4jdv-wqhn" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xjqj-hy9t-nfb7" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" }, { "vulnerability": "VCID-zrfg-a5m3-jkf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.2.14%252Bdfsg-0%252Bdeb8u9" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036930?format=api", "purl": "pkg:deb/debian/samba@2:4.5.16%2Bdfsg-1%2Bdeb9u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.5.16%252Bdfsg-1%252Bdeb9u2" } ], "aliases": [ "CVE-2016-2113" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9smc-af63-x7cg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46495?format=api", "vulnerability_id": "VCID-a653-r4dy-bba9", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which may allow remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7494.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7494.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7494", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.94176", "scoring_system": "epss", "scoring_elements": "0.99917", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.94176", "scoring_system": "epss", "scoring_elements": "0.99919", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.94176", "scoring_system": "epss", "scoring_elements": "0.99918", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.94176", "scoring_system": "epss", "scoring_elements": "0.99921", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.94176", "scoring_system": "epss", "scoring_elements": "0.9992", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.94245", "scoring_system": "epss", "scoring_elements": "0.99929", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7494" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7494", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7494" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "9", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:C/I:C/A:C" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1038552", "reference_id": "1038552", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:29:34Z/" } ], "url": "http://www.securitytracker.com/id/1038552" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1450347", "reference_id": "1450347", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1450347" }, { "reference_url": "https://www.exploit-db.com/exploits/42060/", "reference_id": "42060", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:29:34Z/" } ], "url": "https://www.exploit-db.com/exploits/42060/" }, { "reference_url": "https://www.exploit-db.com/exploits/42084/", "reference_id": "42084", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:29:34Z/" } ], "url": "https://www.exploit-db.com/exploits/42084/" }, { "reference_url": "http://www.securityfocus.com/bid/98636", "reference_id": "98636", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:29:34Z/" } ], "url": "http://www.securityfocus.com/bid/98636" }, { "reference_url": "https://security.archlinux.org/ASA-201705-22", "reference_id": "ASA-201705-22", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201705-22" }, { "reference_url": "https://security.archlinux.org/AVG-279", "reference_id": "AVG-279", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-279" }, { "reference_url": "https://github.com/rapid7/metasploit-framework/blob/ae22b4ccf4a3dde77ec339d83091b057aa7e9a77/modules/exploits/linux/samba/is_known_pipename.rb", "reference_id": "CVE-2017-7494", "reference_type": "exploit", "scores": [], "url": "https://github.com/rapid7/metasploit-framework/blob/ae22b4ccf4a3dde77ec339d83091b057aa7e9a77/modules/exploits/linux/samba/is_known_pipename.rb" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/42060.py", "reference_id": "CVE-2017-7494", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/42060.py" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/42084.rb", "reference_id": "CVE-2017-7494", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/42084.rb" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2017-7494.html", "reference_id": "CVE-2017-7494.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:29:34Z/" } ], "url": "https://www.samba.org/samba/security/CVE-2017-7494.html" }, { "reference_url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbns03755en_us", "reference_id": "display?docLocale=en_US&docId=emr_na-hpesbns03755en_us", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:29:34Z/" } ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbns03755en_us" }, { "reference_url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03759en_us", "reference_id": "display?docLocale=en_US&docId=emr_na-hpesbux03759en_us", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:29:34Z/" } ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03759en_us" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3860", "reference_id": "dsa-3860", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:29:34Z/" } ], "url": "http://www.debian.org/security/2017/dsa-3860" }, { "reference_url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet&p_File_Name=SEVD-2018-095-01+Security+Notification+Umotion+V1.1.pdf&p_Doc_Ref=SEVD-2018-095-01", "reference_id": "files?p_enDocType=Technical+leaflet&p_File_Name=SEVD-2018-095-01+Security+Notification+Umotion+V1.1.pdf&p_Doc_Ref=SEVD-2018-095-01", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:29:34Z/" } ], "url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet&p_File_Name=SEVD-2018-095-01+Security+Notification+Umotion+V1.1.pdf&p_Doc_Ref=SEVD-2018-095-01" }, { "reference_url": "https://security.gentoo.org/glsa/201805-07", "reference_id": "GLSA-201805-07", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:29:34Z/" } ], "url": "https://security.gentoo.org/glsa/201805-07" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20170524-0001/", "reference_id": "ntap-20170524-0001", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:29:34Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20170524-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1270", "reference_id": "RHSA-2017:1270", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:29:34Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1270" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1271", "reference_id": "RHSA-2017:1271", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:29:34Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1271" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1272", "reference_id": "RHSA-2017:1272", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:29:34Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1272" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1273", "reference_id": "RHSA-2017:1273", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:29:34Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1273" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1390", "reference_id": "RHSA-2017:1390", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:29:34Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1390" }, { "reference_url": "https://usn.ubuntu.com/3296-1/", "reference_id": "USN-3296-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3296-1/" }, { "reference_url": "https://usn.ubuntu.com/3296-2/", "reference_id": "USN-3296-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3296-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035709?format=api", "purl": "pkg:deb/debian/samba@2:4.2.14%2Bdfsg-0%2Bdeb8u9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-2q9w-nvzs-g7cp" }, { "vulnerability": "VCID-364y-r11r-u7cm" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4mdk-6qnf-r7f7" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-4v8q-akyc-k7hn" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-66cs-n3ad-efgy" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-8uqh-s6xh-vycb" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9smc-af63-x7cg" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-a653-r4dy-bba9" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-e3gq-5a8s-akh4" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-jd7n-tjpq-3uc9" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-p33p-zg9p-nyfy" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qvhg-pkpb-sbcy" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-sgp8-b3jx-cbh5" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-w3qg-p74x-jbff" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wk1w-4jdv-wqhn" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xjqj-hy9t-nfb7" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" }, { "vulnerability": "VCID-zrfg-a5m3-jkf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.2.14%252Bdfsg-0%252Bdeb8u9" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036930?format=api", "purl": "pkg:deb/debian/samba@2:4.5.16%2Bdfsg-1%2Bdeb9u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.5.16%252Bdfsg-1%252Bdeb9u2" } ], "aliases": [ "CVE-2017-7494" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a653-r4dy-bba9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47955?format=api", "vulnerability_id": "VCID-cjqf-muwp-3qbq", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14629.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14629.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14629", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.09242", "scoring_system": "epss", "scoring_elements": "0.92692", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.09242", "scoring_system": "epss", "scoring_elements": "0.92771", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.09242", "scoring_system": "epss", "scoring_elements": "0.92746", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.09242", "scoring_system": "epss", "scoring_elements": "0.92759", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.09242", "scoring_system": "epss", "scoring_elements": "0.92699", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.09242", "scoring_system": "epss", "scoring_elements": "0.92705", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.09242", "scoring_system": "epss", "scoring_elements": "0.92704", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.09242", "scoring_system": "epss", "scoring_elements": "0.92714", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.09242", "scoring_system": "epss", "scoring_elements": "0.92718", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.09242", "scoring_system": "epss", "scoring_elements": "0.92724", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.09242", "scoring_system": "epss", "scoring_elements": "0.92723", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.09242", "scoring_system": "epss", "scoring_elements": "0.92734", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.09242", "scoring_system": "epss", "scoring_elements": "0.92738", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.09242", "scoring_system": "epss", "scoring_elements": "0.92742", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14629" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14629", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14629" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16841", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16851" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1625449", "reference_id": "1625449", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1625449" }, { "reference_url": "https://security.archlinux.org/ASA-201811-22", "reference_id": "ASA-201811-22", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201811-22" }, { "reference_url": "https://security.archlinux.org/AVG-823", "reference_id": "AVG-823", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-823" }, { "reference_url": "https://security.gentoo.org/glsa/202003-52", "reference_id": "GLSA-202003-52", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-52" }, { "reference_url": "https://usn.ubuntu.com/3827-1/", "reference_id": "USN-3827-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3827-1/" }, { "reference_url": "https://usn.ubuntu.com/3827-2/", "reference_id": "USN-3827-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3827-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036930?format=api", "purl": "pkg:deb/debian/samba@2:4.5.16%2Bdfsg-1%2Bdeb9u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.5.16%252Bdfsg-1%252Bdeb9u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038160?format=api", "purl": "pkg:deb/debian/samba@2:4.9.5%2Bdfsg-5%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-5%252Bdeb10u3" } ], "aliases": [ "CVE-2018-14629" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cjqf-muwp-3qbq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61606?format=api", "vulnerability_id": "VCID-e3gq-5a8s-akh4", "summary": "security update", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00063.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00063.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0771.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0771.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0771", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05663", "scoring_system": "epss", "scoring_elements": "0.90442", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.05663", "scoring_system": "epss", "scoring_elements": "0.90431", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.05663", "scoring_system": "epss", "scoring_elements": "0.90338", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05663", "scoring_system": "epss", "scoring_elements": "0.90341", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05663", "scoring_system": "epss", "scoring_elements": "0.90352", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05663", "scoring_system": "epss", "scoring_elements": "0.90356", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05663", "scoring_system": "epss", "scoring_elements": "0.9037", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05663", "scoring_system": "epss", "scoring_elements": "0.90376", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05663", "scoring_system": "epss", "scoring_elements": "0.90384", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05663", "scoring_system": "epss", "scoring_elements": "0.90378", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05663", "scoring_system": "epss", "scoring_elements": "0.90393", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05663", "scoring_system": "epss", "scoring_elements": "0.9039", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05663", "scoring_system": "epss", "scoring_elements": "0.90405", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.05663", "scoring_system": "epss", "scoring_elements": "0.90404", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.05663", "scoring_system": "epss", "scoring_elements": "0.904", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.05663", "scoring_system": "epss", "scoring_elements": "0.90413", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0771" }, { "reference_url": "https://bugzilla.samba.org/show_bug.cgi?id=11128", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.samba.org/show_bug.cgi?id=11128" }, { "reference_url": "https://bugzilla.samba.org/show_bug.cgi?id=11686", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.samba.org/show_bug.cgi?id=11686" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7560", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7560" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0771", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0771" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2016-0771.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.samba.org/samba/security/CVE-2016-0771.html" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3514", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3514" }, { "reference_url": "http://www.securityfocus.com/bid/84273", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/84273" }, { "reference_url": "http://www.securitytracker.com/id/1035219", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035219" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2922-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2922-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1309978", "reference_id": "1309978", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1309978" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.4.0:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.4.0:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.4.0:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0771", "reference_id": "CVE-2016-0771", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:S/C:P/I:N/A:P" }, { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0771" }, { "reference_url": "https://usn.ubuntu.com/2922-1/", "reference_id": "USN-2922-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2922-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571315?format=api", "purl": "pkg:deb/debian/samba@2:3.6.6-6%2Bdeb7u7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-26kr-61ku-ufe2" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-2q9w-nvzs-g7cp" }, { "vulnerability": "VCID-364y-r11r-u7cm" }, { "vulnerability": "VCID-3w4u-k81w-hued" }, { "vulnerability": "VCID-45rp-gyp5-ukfb" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4mdk-6qnf-r7f7" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-4v8q-akyc-k7hn" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-66cs-n3ad-efgy" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-7xaa-6397-eyby" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-8uqh-s6xh-vycb" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9smc-af63-x7cg" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-a653-r4dy-bba9" }, { "vulnerability": "VCID-c9k2-wjf4-gbg6" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-chw6-82ck-huhg" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-cu61-u4g4-kka7" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-e3gq-5a8s-akh4" }, { "vulnerability": "VCID-esjb-wmzz-fuc7" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fc2s-dwmh-w3gf" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-jc62-j5kx-hqdc" }, { "vulnerability": "VCID-jd7n-tjpq-3uc9" }, { "vulnerability": "VCID-jdu1-822a-rkbu" }, { "vulnerability": "VCID-kkgp-9x4z-gue3" }, { "vulnerability": "VCID-kx2z-r7z8-qffr" }, { "vulnerability": "VCID-ky5x-ujtx-fbe6" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-m5m4-8jr4-f3dz" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-p33p-zg9p-nyfy" }, { "vulnerability": "VCID-q3qf-qtjv-cyat" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qvhg-pkpb-sbcy" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-r6dg-tbre-5fer" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-sgp8-b3jx-cbh5" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tan8-tfz4-eudy" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-tvka-n7p1-nbec" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vjmz-bp2f-bbc1" }, { "vulnerability": "VCID-vk96-dpt8-2uav" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-w3qg-p74x-jbff" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wk1w-4jdv-wqhn" }, { "vulnerability": "VCID-wm2r-x7yy-sbhb" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-x3bk-7vqp-3qgy" }, { "vulnerability": "VCID-xjqj-hy9t-nfb7" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycdc-vg8w-6kew" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" }, { "vulnerability": "VCID-zrfg-a5m3-jkf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:3.6.6-6%252Bdeb7u7" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035709?format=api", "purl": "pkg:deb/debian/samba@2:4.2.14%2Bdfsg-0%2Bdeb8u9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-2q9w-nvzs-g7cp" }, { "vulnerability": "VCID-364y-r11r-u7cm" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4mdk-6qnf-r7f7" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-4v8q-akyc-k7hn" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-66cs-n3ad-efgy" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-8uqh-s6xh-vycb" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9smc-af63-x7cg" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-a653-r4dy-bba9" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-e3gq-5a8s-akh4" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-jd7n-tjpq-3uc9" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-p33p-zg9p-nyfy" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qvhg-pkpb-sbcy" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-sgp8-b3jx-cbh5" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-w3qg-p74x-jbff" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wk1w-4jdv-wqhn" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xjqj-hy9t-nfb7" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" }, { "vulnerability": "VCID-zrfg-a5m3-jkf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.2.14%252Bdfsg-0%252Bdeb8u9" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036930?format=api", "purl": "pkg:deb/debian/samba@2:4.5.16%2Bdfsg-1%2Bdeb9u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.5.16%252Bdfsg-1%252Bdeb9u2" } ], "aliases": [ "CVE-2016-0771" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e3gq-5a8s-akh4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46494?format=api", "vulnerability_id": "VCID-fxgm-p1bm-r7ev", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which may allow remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15275.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15275.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15275", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.4327", "scoring_system": "epss", "scoring_elements": "0.97525", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.4327", "scoring_system": "epss", "scoring_elements": "0.97498", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.4327", "scoring_system": "epss", "scoring_elements": "0.975", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.4327", "scoring_system": "epss", "scoring_elements": "0.97501", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.4327", "scoring_system": "epss", "scoring_elements": "0.97509", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.4327", "scoring_system": "epss", "scoring_elements": "0.9751", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.4327", "scoring_system": "epss", "scoring_elements": "0.97511", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.4327", "scoring_system": "epss", "scoring_elements": "0.97513", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.4327", "scoring_system": "epss", "scoring_elements": "0.97518", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.4327", "scoring_system": "epss", "scoring_elements": "0.97522", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.44014", "scoring_system": "epss", "scoring_elements": "0.97522", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.44014", "scoring_system": "epss", "scoring_elements": "0.97516", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.44014", "scoring_system": "epss", "scoring_elements": "0.97525", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.45047", "scoring_system": "epss", "scoring_elements": "0.97587", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.49745", "scoring_system": "epss", "scoring_elements": "0.97801", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.49745", "scoring_system": "epss", "scoring_elements": "0.97796", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15275" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15275", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15275" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00029.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00029.html" }, { "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03817en_us", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03817en_us" }, { "reference_url": "https://www.debian.org/security/2017/dsa-4043", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2017/dsa-4043" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2017-15275.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.samba.org/samba/security/CVE-2017-15275.html" }, { "reference_url": "https://www.synology.com/support/security/Synology_SA_17_72_Samba", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.synology.com/support/security/Synology_SA_17_72_Samba" }, { "reference_url": "http://www.securityfocus.com/bid/101908", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/101908" }, { "reference_url": "http://www.securitytracker.com/id/1039855", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1039855" }, { "reference_url": "http://www.ubuntu.com/usn/USN-3486-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-3486-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-3486-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-3486-2" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1512465", "reference_id": "1512465", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1512465" }, { "reference_url": "https://security.archlinux.org/ASA-201712-1", "reference_id": "ASA-201712-1", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201712-1" }, { "reference_url": "https://security.archlinux.org/AVG-535", "reference_id": "AVG-535", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-535" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15275", "reference_id": "CVE-2017-15275", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N" }, { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15275" }, { "reference_url": "https://security.gentoo.org/glsa/201805-07", "reference_id": "GLSA-201805-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201805-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:3260", "reference_id": "RHSA-2017:3260", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:3260" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:3261", "reference_id": "RHSA-2017:3261", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:3261" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:3278", "reference_id": "RHSA-2017:3278", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:3278" }, { "reference_url": "https://usn.ubuntu.com/3486-1/", "reference_id": "USN-3486-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3486-1/" }, { "reference_url": "https://usn.ubuntu.com/3486-2/", "reference_id": "USN-3486-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3486-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035709?format=api", "purl": "pkg:deb/debian/samba@2:4.2.14%2Bdfsg-0%2Bdeb8u9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-2q9w-nvzs-g7cp" }, { "vulnerability": "VCID-364y-r11r-u7cm" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4mdk-6qnf-r7f7" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-4v8q-akyc-k7hn" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-66cs-n3ad-efgy" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-8uqh-s6xh-vycb" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9smc-af63-x7cg" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-a653-r4dy-bba9" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-e3gq-5a8s-akh4" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-jd7n-tjpq-3uc9" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-p33p-zg9p-nyfy" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qvhg-pkpb-sbcy" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-sgp8-b3jx-cbh5" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-w3qg-p74x-jbff" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wk1w-4jdv-wqhn" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xjqj-hy9t-nfb7" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" }, { "vulnerability": "VCID-zrfg-a5m3-jkf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.2.14%252Bdfsg-0%252Bdeb8u9" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036930?format=api", "purl": "pkg:deb/debian/samba@2:4.5.16%2Bdfsg-1%2Bdeb9u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.5.16%252Bdfsg-1%252Bdeb9u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038160?format=api", "purl": "pkg:deb/debian/samba@2:4.9.5%2Bdfsg-5%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-5%252Bdeb10u3" } ], "aliases": [ "CVE-2017-15275" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fxgm-p1bm-r7ev" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47957?format=api", "vulnerability_id": "VCID-h2pu-vhv4-yfhx", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16851.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16851.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16851", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.92672", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.92751", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.92726", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.9274", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.92679", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.92685", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.92684", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.92694", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.92699", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.92705", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.92704", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.92703", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.92715", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.9272", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.92723", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.92724", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.92718", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16851" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14629", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14629" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16841", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16851" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646377", "reference_id": "1646377", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646377" }, { "reference_url": "https://security.archlinux.org/ASA-201811-22", "reference_id": "ASA-201811-22", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201811-22" }, { "reference_url": "https://security.archlinux.org/AVG-823", "reference_id": "AVG-823", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-823" }, { "reference_url": "https://security.gentoo.org/glsa/202003-52", "reference_id": "GLSA-202003-52", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-52" }, { "reference_url": "https://usn.ubuntu.com/3827-1/", "reference_id": "USN-3827-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3827-1/" }, { "reference_url": "https://usn.ubuntu.com/3827-2/", "reference_id": "USN-3827-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3827-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036930?format=api", "purl": "pkg:deb/debian/samba@2:4.5.16%2Bdfsg-1%2Bdeb9u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.5.16%252Bdfsg-1%252Bdeb9u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038160?format=api", "purl": "pkg:deb/debian/samba@2:4.9.5%2Bdfsg-5%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-5%252Bdeb10u3" } ], "aliases": [ "CVE-2018-16851" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h2pu-vhv4-yfhx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63876?format=api", "vulnerability_id": "VCID-j9a3-25xa-c3g3", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12151.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12151.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12151", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04146", "scoring_system": "epss", "scoring_elements": "0.88606", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04146", "scoring_system": "epss", "scoring_elements": "0.88729", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.04146", "scoring_system": "epss", "scoring_elements": "0.887", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.04146", "scoring_system": "epss", "scoring_elements": "0.88716", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.04146", "scoring_system": "epss", "scoring_elements": "0.88615", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04146", "scoring_system": "epss", "scoring_elements": "0.88631", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04146", "scoring_system": "epss", "scoring_elements": "0.88633", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04146", "scoring_system": "epss", "scoring_elements": "0.88651", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04146", "scoring_system": "epss", "scoring_elements": "0.88656", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04146", "scoring_system": "epss", "scoring_elements": "0.88668", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04146", "scoring_system": "epss", "scoring_elements": "0.88661", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04146", "scoring_system": "epss", "scoring_elements": "0.88675", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04146", "scoring_system": "epss", "scoring_elements": "0.88671", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04146", "scoring_system": "epss", "scoring_elements": "0.8867", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04146", "scoring_system": "epss", "scoring_elements": "0.88685", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.04146", "scoring_system": "epss", "scoring_elements": "0.8869", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.04146", "scoring_system": "epss", "scoring_elements": "0.88689", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12151" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12150", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12150" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12151", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12151" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12163", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12163" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:M/Au:N/C:C/I:C/A:N" }, { "value": "8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1488197", "reference_id": "1488197", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1488197" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2790", "reference_id": "RHSA-2017:2790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2858", "reference_id": "RHSA-2017:2858", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2858" }, { "reference_url": "https://usn.ubuntu.com/3426-1/", "reference_id": "USN-3426-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3426-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035709?format=api", "purl": "pkg:deb/debian/samba@2:4.2.14%2Bdfsg-0%2Bdeb8u9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-2q9w-nvzs-g7cp" }, { "vulnerability": "VCID-364y-r11r-u7cm" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4mdk-6qnf-r7f7" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-4v8q-akyc-k7hn" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-66cs-n3ad-efgy" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-8uqh-s6xh-vycb" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9smc-af63-x7cg" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-a653-r4dy-bba9" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-e3gq-5a8s-akh4" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-jd7n-tjpq-3uc9" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-p33p-zg9p-nyfy" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qvhg-pkpb-sbcy" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-sgp8-b3jx-cbh5" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-w3qg-p74x-jbff" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wk1w-4jdv-wqhn" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xjqj-hy9t-nfb7" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" }, { "vulnerability": "VCID-zrfg-a5m3-jkf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.2.14%252Bdfsg-0%252Bdeb8u9" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036930?format=api", "purl": "pkg:deb/debian/samba@2:4.5.16%2Bdfsg-1%2Bdeb9u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.5.16%252Bdfsg-1%252Bdeb9u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038160?format=api", "purl": "pkg:deb/debian/samba@2:4.9.5%2Bdfsg-5%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-5%252Bdeb10u3" } ], "aliases": [ "CVE-2017-12151" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j9a3-25xa-c3g3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50103?format=api", "vulnerability_id": "VCID-jd7n-tjpq-3uc9", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which may allow execution of arbitrary code with root privileges.", "references": [ { "reference_url": "http://badlock.org/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://badlock.org/" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0611.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0611.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0613.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0613.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0619.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0619.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0621.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0621.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0623.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0623.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0624.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0624.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0625.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0625.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2118.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2118.json" }, { "reference_url": "https://access.redhat.com/security/vulnerabilities/badlock", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/security/vulnerabilities/badlock" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2118", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.78522", "scoring_system": "epss", "scoring_elements": "0.99051", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.78522", "scoring_system": "epss", "scoring_elements": "0.99049", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.78522", "scoring_system": "epss", "scoring_elements": "0.9905", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.78522", "scoring_system": "epss", "scoring_elements": "0.99028", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.78522", "scoring_system": "epss", "scoring_elements": "0.99029", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.78522", "scoring_system": "epss", "scoring_elements": "0.99032", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.78522", "scoring_system": "epss", "scoring_elements": "0.99034", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.78522", "scoring_system": "epss", "scoring_elements": "0.99035", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.78522", "scoring_system": "epss", "scoring_elements": "0.99036", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.78522", "scoring_system": "epss", "scoring_elements": "0.99037", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.78522", "scoring_system": "epss", "scoring_elements": "0.99038", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.78522", "scoring_system": "epss", "scoring_elements": "0.99039", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.78522", "scoring_system": "epss", "scoring_elements": "0.9904", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.78522", "scoring_system": "epss", "scoring_elements": "0.99042", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.78522", "scoring_system": "epss", "scoring_elements": "0.99043", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.78522", "scoring_system": "epss", "scoring_elements": "0.99045", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.78522", "scoring_system": "epss", "scoring_elements": "0.99046", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2118" }, { "reference_url": "https://bto.bluecoat.com/security-advisory/sa122", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bto.bluecoat.com/security-advisory/sa122" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2114", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2114" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05166182", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05166182" }, { "reference_url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes", "reference_id": "", "reference_type": "", "scores": [], "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes" }, { "reference_url": "https://kb.netapp.com/support/s/article/ka51A0000008SXzQAM/smb-vulnerabilities-in-multiple-netapp-products", "reference_id": "", "reference_type": "", "scores": [], "url": "https://kb.netapp.com/support/s/article/ka51A0000008SXzQAM/smb-vulnerabilities-in-multiple-netapp-products" }, { "reference_url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40196", "reference_id": "", "reference_type": "", "scores": [], "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40196" }, { "reference_url": "https://www.kb.cert.org/vuls/id/813296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.kb.cert.org/vuls/id/813296" }, { "reference_url": "https://www.samba.org/samba/history/samba-4.2.10.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.samba.org/samba/history/samba-4.2.10.html" }, { "reference_url": "https://www.samba.org/samba/latest_news.html#4.4.2", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.samba.org/samba/latest_news.html#4.4.2" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2016-2118.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.samba.org/samba/security/CVE-2016-2118.html" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3548", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3548" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "reference_url": "http://www.securityfocus.com/bid/86002", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/86002" }, { "reference_url": "http://www.securitytracker.com/id/1035533", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035533" }, { "reference_url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.458012", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.458012" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2950-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2950-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2950-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2950-2" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2950-3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2950-3" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2950-4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2950-4" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2950-5", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2950-5" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1317990", "reference_id": "1317990", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1317990" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2118", "reference_id": "CVE-2016-2118", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2118" }, { "reference_url": "https://security.gentoo.org/glsa/201612-47", "reference_id": "GLSA-201612-47", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201612-47" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0611", "reference_id": "RHSA-2016:0611", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0611" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0612", "reference_id": "RHSA-2016:0612", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0612" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0613", "reference_id": "RHSA-2016:0613", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0613" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0614", "reference_id": "RHSA-2016:0614", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0614" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0618", "reference_id": "RHSA-2016:0618", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0618" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0619", "reference_id": "RHSA-2016:0619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0619" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0620", "reference_id": "RHSA-2016:0620", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0620" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0621", "reference_id": "RHSA-2016:0621", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0621" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0623", "reference_id": "RHSA-2016:0623", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0623" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0624", "reference_id": "RHSA-2016:0624", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0624" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0625", "reference_id": "RHSA-2016:0625", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0625" }, { "reference_url": "https://usn.ubuntu.com/2950-1/", "reference_id": "USN-2950-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2950-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571326?format=api", "purl": "pkg:deb/debian/samba@2:4.1.11%2Bdfsg-1~bpo70%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-26kr-61ku-ufe2" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-2q9w-nvzs-g7cp" }, { "vulnerability": "VCID-364y-r11r-u7cm" }, { "vulnerability": "VCID-45rp-gyp5-ukfb" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4mdk-6qnf-r7f7" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-4v8q-akyc-k7hn" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-66cs-n3ad-efgy" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-7xaa-6397-eyby" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-8uqh-s6xh-vycb" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9smc-af63-x7cg" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-a653-r4dy-bba9" }, { "vulnerability": "VCID-c9k2-wjf4-gbg6" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-e3gq-5a8s-akh4" }, { "vulnerability": "VCID-esjb-wmzz-fuc7" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fc2s-dwmh-w3gf" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-jd7n-tjpq-3uc9" }, { "vulnerability": "VCID-kkgp-9x4z-gue3" }, { "vulnerability": "VCID-kx2z-r7z8-qffr" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-p33p-zg9p-nyfy" }, { "vulnerability": "VCID-q3qf-qtjv-cyat" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qvhg-pkpb-sbcy" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-r6dg-tbre-5fer" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-sgp8-b3jx-cbh5" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tan8-tfz4-eudy" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vjmz-bp2f-bbc1" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-w3qg-p74x-jbff" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wk1w-4jdv-wqhn" }, { "vulnerability": "VCID-wm2r-x7yy-sbhb" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xjqj-hy9t-nfb7" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" }, { "vulnerability": "VCID-zrfg-a5m3-jkf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.1.11%252Bdfsg-1~bpo70%252B1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035709?format=api", "purl": "pkg:deb/debian/samba@2:4.2.14%2Bdfsg-0%2Bdeb8u9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-2q9w-nvzs-g7cp" }, { "vulnerability": "VCID-364y-r11r-u7cm" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4mdk-6qnf-r7f7" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-4v8q-akyc-k7hn" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-66cs-n3ad-efgy" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-8uqh-s6xh-vycb" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9smc-af63-x7cg" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-a653-r4dy-bba9" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-e3gq-5a8s-akh4" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-jd7n-tjpq-3uc9" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-p33p-zg9p-nyfy" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qvhg-pkpb-sbcy" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-sgp8-b3jx-cbh5" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-w3qg-p74x-jbff" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wk1w-4jdv-wqhn" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xjqj-hy9t-nfb7" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" }, { "vulnerability": "VCID-zrfg-a5m3-jkf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.2.14%252Bdfsg-0%252Bdeb8u9" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036930?format=api", "purl": "pkg:deb/debian/samba@2:4.5.16%2Bdfsg-1%2Bdeb9u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.5.16%252Bdfsg-1%252Bdeb9u2" } ], "aliases": [ "CVE-2016-2118" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jd7n-tjpq-3uc9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47950?format=api", "vulnerability_id": "VCID-mbcb-7zmf-2yah", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10858.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10858.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10858", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90591", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90595", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90605", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90613", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90624", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90629", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90639", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90634", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90653", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.9065", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90648", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90663", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90665", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90661", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90674", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90693", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90707", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10858" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10858", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10858" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10919", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10919" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1612805", "reference_id": "1612805", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1612805" }, { "reference_url": "https://security.gentoo.org/glsa/202003-52", "reference_id": "GLSA-202003-52", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-52" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2612", "reference_id": "RHSA-2018:2612", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2612" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2613", "reference_id": "RHSA-2018:2613", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2613" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3056", "reference_id": "RHSA-2018:3056", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3056" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3470", "reference_id": "RHSA-2018:3470", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3470" }, { "reference_url": "https://usn.ubuntu.com/3738-1/", "reference_id": "USN-3738-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3738-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036930?format=api", "purl": "pkg:deb/debian/samba@2:4.5.16%2Bdfsg-1%2Bdeb9u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.5.16%252Bdfsg-1%252Bdeb9u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038160?format=api", "purl": "pkg:deb/debian/samba@2:4.9.5%2Bdfsg-5%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-5%252Bdeb10u3" } ], "aliases": [ "CVE-2018-10858" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mbcb-7zmf-2yah" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46496?format=api", "vulnerability_id": "VCID-nted-1p4h-y7fz", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which may allow remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1050.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1050.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1050", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.22357", "scoring_system": "epss", "scoring_elements": "0.95782", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.22357", "scoring_system": "epss", "scoring_elements": "0.9586", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.22357", "scoring_system": "epss", "scoring_elements": "0.95852", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.22357", "scoring_system": "epss", "scoring_elements": "0.95854", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.22357", "scoring_system": "epss", "scoring_elements": "0.95792", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.22357", "scoring_system": "epss", "scoring_elements": "0.958", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.22357", "scoring_system": "epss", "scoring_elements": "0.95803", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.22357", "scoring_system": "epss", "scoring_elements": "0.95811", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.22357", "scoring_system": "epss", "scoring_elements": "0.95814", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.22357", "scoring_system": "epss", "scoring_elements": "0.95818", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.22357", "scoring_system": "epss", "scoring_elements": "0.9582", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.22357", "scoring_system": "epss", "scoring_elements": "0.95831", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.22357", "scoring_system": "epss", "scoring_elements": "0.95836", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.22357", "scoring_system": "epss", "scoring_elements": "0.95839", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.22357", "scoring_system": "epss", "scoring_elements": "0.95841", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1050" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1050", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1050" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1057", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1057" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1538771", "reference_id": "1538771", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1538771" }, { "reference_url": "https://security.archlinux.org/ASA-201803-10", "reference_id": "ASA-201803-10", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201803-10" }, { "reference_url": "https://security.archlinux.org/AVG-651", "reference_id": "AVG-651", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-651" }, { "reference_url": "https://security.gentoo.org/glsa/201805-07", "reference_id": "GLSA-201805-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201805-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1860", "reference_id": "RHSA-2018:1860", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1860" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1883", "reference_id": "RHSA-2018:1883", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1883" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2612", "reference_id": "RHSA-2018:2612", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2612" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2613", "reference_id": "RHSA-2018:2613", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2613" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3056", "reference_id": "RHSA-2018:3056", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3056" }, { "reference_url": "https://usn.ubuntu.com/3595-1/", "reference_id": "USN-3595-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3595-1/" }, { "reference_url": "https://usn.ubuntu.com/3595-2/", "reference_id": "USN-3595-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3595-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036930?format=api", "purl": "pkg:deb/debian/samba@2:4.5.16%2Bdfsg-1%2Bdeb9u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.5.16%252Bdfsg-1%252Bdeb9u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038160?format=api", "purl": "pkg:deb/debian/samba@2:4.9.5%2Bdfsg-5%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-5%252Bdeb10u3" } ], "aliases": [ "CVE-2018-1050" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nted-1p4h-y7fz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81502?format=api", "vulnerability_id": "VCID-p33p-zg9p-nyfy", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2125.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2125.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2125", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.11667", "scoring_system": "epss", "scoring_elements": "0.93636", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.11667", "scoring_system": "epss", "scoring_elements": "0.93729", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.11667", "scoring_system": "epss", "scoring_elements": "0.93709", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.11667", "scoring_system": "epss", "scoring_elements": "0.9372", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.11667", "scoring_system": "epss", "scoring_elements": "0.93646", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.11667", "scoring_system": "epss", "scoring_elements": "0.93655", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.11667", "scoring_system": "epss", "scoring_elements": "0.93657", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.11667", "scoring_system": "epss", "scoring_elements": "0.93666", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.11667", "scoring_system": "epss", "scoring_elements": "0.93668", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.11667", "scoring_system": "epss", "scoring_elements": "0.93672", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.11667", "scoring_system": "epss", "scoring_elements": "0.93673", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.11667", "scoring_system": "epss", "scoring_elements": "0.93674", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.11667", "scoring_system": "epss", "scoring_elements": "0.93691", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.11667", "scoring_system": "epss", "scoring_elements": "0.93698", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.11667", "scoring_system": "epss", "scoring_elements": "0.937", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.11667", "scoring_system": "epss", "scoring_elements": "0.93705", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.11667", "scoring_system": "epss", "scoring_elements": "0.93702", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.11667", "scoring_system": "epss", "scoring_elements": "0.93701", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2125" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2119", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2119" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2123", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2123" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2125", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2125" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2126" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.9", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:M/Au:N/C:P/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403114", "reference_id": "1403114", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403114" }, { "reference_url": "https://security.archlinux.org/ASA-201612-19", "reference_id": "ASA-201612-19", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201612-19" }, { "reference_url": "https://security.archlinux.org/AVG-111", "reference_id": "AVG-111", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-111" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0494", "reference_id": "RHSA-2017:0494", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0494" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0495", "reference_id": "RHSA-2017:0495", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0495" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0662", "reference_id": "RHSA-2017:0662", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0662" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0744", "reference_id": "RHSA-2017:0744", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0744" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1265", "reference_id": "RHSA-2017:1265", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1265" }, { "reference_url": "https://usn.ubuntu.com/3158-1/", "reference_id": "USN-3158-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3158-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035709?format=api", "purl": "pkg:deb/debian/samba@2:4.2.14%2Bdfsg-0%2Bdeb8u9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-2q9w-nvzs-g7cp" }, { "vulnerability": "VCID-364y-r11r-u7cm" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4mdk-6qnf-r7f7" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-4v8q-akyc-k7hn" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-66cs-n3ad-efgy" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-8uqh-s6xh-vycb" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9smc-af63-x7cg" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-a653-r4dy-bba9" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-e3gq-5a8s-akh4" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-jd7n-tjpq-3uc9" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-p33p-zg9p-nyfy" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qvhg-pkpb-sbcy" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-sgp8-b3jx-cbh5" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-w3qg-p74x-jbff" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wk1w-4jdv-wqhn" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xjqj-hy9t-nfb7" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" }, { "vulnerability": "VCID-zrfg-a5m3-jkf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.2.14%252Bdfsg-0%252Bdeb8u9" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036930?format=api", "purl": "pkg:deb/debian/samba@2:4.5.16%2Bdfsg-1%2Bdeb9u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.5.16%252Bdfsg-1%252Bdeb9u2" } ], "aliases": [ "CVE-2016-2125" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p33p-zg9p-nyfy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50097?format=api", "vulnerability_id": "VCID-qvhg-pkpb-sbcy", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which may allow execution of arbitrary code with root privileges.", "references": [ { "reference_url": "http://badlock.org/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://badlock.org/" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00046.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00046.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00124.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00124.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0611.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0611.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0613.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0613.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0619.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0619.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0621.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0621.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0623.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0623.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0624.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0624.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0625.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0625.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2110.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2110.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2110", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.17748", "scoring_system": "epss", "scoring_elements": "0.95148", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.17748", "scoring_system": "epss", "scoring_elements": "0.95164", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.17748", "scoring_system": "epss", "scoring_elements": "0.95154", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.20925", "scoring_system": "epss", "scoring_elements": "0.95613", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.20925", "scoring_system": "epss", "scoring_elements": "0.95622", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.20925", "scoring_system": "epss", "scoring_elements": "0.95625", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.20925", "scoring_system": "epss", "scoring_elements": "0.95597", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.20925", "scoring_system": "epss", "scoring_elements": "0.95633", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.20925", "scoring_system": "epss", "scoring_elements": "0.95641", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.20925", "scoring_system": "epss", "scoring_elements": "0.95645", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.20925", "scoring_system": "epss", "scoring_elements": "0.95646", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.20925", "scoring_system": "epss", "scoring_elements": "0.95648", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.20925", "scoring_system": "epss", "scoring_elements": "0.9563", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.20925", "scoring_system": "epss", "scoring_elements": "0.95606", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.20925", "scoring_system": "epss", "scoring_elements": "0.95611", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2110" }, { "reference_url": "https://bto.bluecoat.com/security-advisory/sa122", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bto.bluecoat.com/security-advisory/sa122" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2114", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2114" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05087821", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05087821" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05082964", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05082964" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399" }, { "reference_url": "https://www.samba.org/samba/history/samba-4.2.10.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.samba.org/samba/history/samba-4.2.10.html" }, { "reference_url": "https://www.samba.org/samba/latest_news.html#4.4.2", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.samba.org/samba/latest_news.html#4.4.2" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2016-2110.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.samba.org/samba/security/CVE-2016-2110.html" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3548", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3548" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "reference_url": "http://www.securitytracker.com/id/1035533", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035533" }, { "reference_url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.458012", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.458012" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2950-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2950-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2950-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2950-2" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2950-3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2950-3" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2950-4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2950-4" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2950-5", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2950-5" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1311893", "reference_id": "1311893", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1311893" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.24:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.24:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.24:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.25:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.25:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.25:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.25:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.25:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.25:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.26:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.26:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.26:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2110", "reference_id": "CVE-2016-2110", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" }, { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2110" }, { "reference_url": "https://security.gentoo.org/glsa/201612-47", "reference_id": "GLSA-201612-47", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201612-47" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0611", "reference_id": "RHSA-2016:0611", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0611" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0612", "reference_id": "RHSA-2016:0612", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0612" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0613", "reference_id": "RHSA-2016:0613", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0613" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0614", "reference_id": "RHSA-2016:0614", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0614" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0618", "reference_id": "RHSA-2016:0618", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0618" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0619", "reference_id": "RHSA-2016:0619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0619" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0620", "reference_id": "RHSA-2016:0620", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0620" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0621", "reference_id": "RHSA-2016:0621", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0621" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0623", "reference_id": "RHSA-2016:0623", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0623" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0624", "reference_id": "RHSA-2016:0624", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0624" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0625", "reference_id": "RHSA-2016:0625", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0625" }, { "reference_url": "https://usn.ubuntu.com/2950-1/", "reference_id": "USN-2950-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2950-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571326?format=api", "purl": "pkg:deb/debian/samba@2:4.1.11%2Bdfsg-1~bpo70%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-26kr-61ku-ufe2" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-2q9w-nvzs-g7cp" }, { "vulnerability": "VCID-364y-r11r-u7cm" }, { "vulnerability": "VCID-45rp-gyp5-ukfb" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4mdk-6qnf-r7f7" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-4v8q-akyc-k7hn" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-66cs-n3ad-efgy" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-7xaa-6397-eyby" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-8uqh-s6xh-vycb" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9smc-af63-x7cg" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-a653-r4dy-bba9" }, { "vulnerability": "VCID-c9k2-wjf4-gbg6" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-e3gq-5a8s-akh4" }, { "vulnerability": "VCID-esjb-wmzz-fuc7" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fc2s-dwmh-w3gf" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-jd7n-tjpq-3uc9" }, { "vulnerability": "VCID-kkgp-9x4z-gue3" }, { "vulnerability": "VCID-kx2z-r7z8-qffr" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-p33p-zg9p-nyfy" }, { "vulnerability": "VCID-q3qf-qtjv-cyat" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qvhg-pkpb-sbcy" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-r6dg-tbre-5fer" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-sgp8-b3jx-cbh5" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tan8-tfz4-eudy" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vjmz-bp2f-bbc1" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-w3qg-p74x-jbff" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wk1w-4jdv-wqhn" }, { "vulnerability": "VCID-wm2r-x7yy-sbhb" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xjqj-hy9t-nfb7" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" }, { "vulnerability": "VCID-zrfg-a5m3-jkf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.1.11%252Bdfsg-1~bpo70%252B1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035709?format=api", "purl": "pkg:deb/debian/samba@2:4.2.14%2Bdfsg-0%2Bdeb8u9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-2q9w-nvzs-g7cp" }, { "vulnerability": "VCID-364y-r11r-u7cm" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4mdk-6qnf-r7f7" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-4v8q-akyc-k7hn" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-66cs-n3ad-efgy" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-8uqh-s6xh-vycb" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9smc-af63-x7cg" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-a653-r4dy-bba9" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-e3gq-5a8s-akh4" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-jd7n-tjpq-3uc9" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-p33p-zg9p-nyfy" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qvhg-pkpb-sbcy" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-sgp8-b3jx-cbh5" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-w3qg-p74x-jbff" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wk1w-4jdv-wqhn" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xjqj-hy9t-nfb7" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" }, { "vulnerability": "VCID-zrfg-a5m3-jkf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.2.14%252Bdfsg-0%252Bdeb8u9" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036930?format=api", "purl": "pkg:deb/debian/samba@2:4.5.16%2Bdfsg-1%2Bdeb9u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.5.16%252Bdfsg-1%252Bdeb9u2" } ], "aliases": [ "CVE-2016-2110" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qvhg-pkpb-sbcy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46493?format=api", "vulnerability_id": "VCID-rvux-gcuh-vuca", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which may allow remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14746.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14746.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-14746", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.31253", "scoring_system": "epss", "scoring_elements": "0.96799", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.31253", "scoring_system": "epss", "scoring_elements": "0.96762", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.31253", "scoring_system": "epss", "scoring_elements": "0.96765", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.31253", "scoring_system": "epss", "scoring_elements": "0.9677", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.31253", "scoring_system": "epss", "scoring_elements": "0.96775", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.31253", "scoring_system": "epss", "scoring_elements": "0.96777", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.31253", "scoring_system": "epss", "scoring_elements": "0.96779", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.31253", "scoring_system": "epss", "scoring_elements": "0.96781", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.31253", "scoring_system": "epss", "scoring_elements": "0.96791", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.31253", "scoring_system": "epss", "scoring_elements": "0.96794", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.32893", "scoring_system": "epss", "scoring_elements": "0.96879", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.42986", "scoring_system": "epss", "scoring_elements": "0.97462", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.42986", "scoring_system": "epss", "scoring_elements": "0.9748", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.42986", "scoring_system": "epss", "scoring_elements": "0.97469", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.42986", "scoring_system": "epss", "scoring_elements": "0.97473", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.42986", "scoring_system": "epss", "scoring_elements": "0.97474", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-14746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15275", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15275" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03817en_us", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03817en_us" }, { "reference_url": "https://www.debian.org/security/2017/dsa-4043", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2017/dsa-4043" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2017-14746.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.samba.org/samba/security/CVE-2017-14746.html" }, { "reference_url": "https://www.synology.com/support/security/Synology_SA_17_72_Samba", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.synology.com/support/security/Synology_SA_17_72_Samba" }, { "reference_url": "http://www.securityfocus.com/bid/101907", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/101907" }, { "reference_url": "http://www.securitytracker.com/id/1039856", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1039856" }, { "reference_url": "http://www.ubuntu.com/usn/USN-3486-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-3486-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1511899", "reference_id": "1511899", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1511899" }, { "reference_url": "https://security.archlinux.org/ASA-201712-1", "reference_id": "ASA-201712-1", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201712-1" }, { "reference_url": "https://security.archlinux.org/AVG-535", "reference_id": "AVG-535", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-535" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-14746", "reference_id": "CVE-2017-14746", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-14746" }, { "reference_url": "https://security.gentoo.org/glsa/201805-07", "reference_id": "GLSA-201805-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201805-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:3260", "reference_id": "RHSA-2017:3260", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:3260" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:3261", "reference_id": "RHSA-2017:3261", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:3261" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:3278", "reference_id": "RHSA-2017:3278", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:3278" }, { "reference_url": "https://usn.ubuntu.com/3486-1/", "reference_id": "USN-3486-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3486-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035709?format=api", "purl": "pkg:deb/debian/samba@2:4.2.14%2Bdfsg-0%2Bdeb8u9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-2q9w-nvzs-g7cp" }, { "vulnerability": "VCID-364y-r11r-u7cm" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4mdk-6qnf-r7f7" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-4v8q-akyc-k7hn" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-66cs-n3ad-efgy" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-8uqh-s6xh-vycb" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9smc-af63-x7cg" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-a653-r4dy-bba9" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-e3gq-5a8s-akh4" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-jd7n-tjpq-3uc9" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-p33p-zg9p-nyfy" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qvhg-pkpb-sbcy" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-sgp8-b3jx-cbh5" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-w3qg-p74x-jbff" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wk1w-4jdv-wqhn" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xjqj-hy9t-nfb7" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" }, { "vulnerability": "VCID-zrfg-a5m3-jkf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.2.14%252Bdfsg-0%252Bdeb8u9" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036930?format=api", "purl": "pkg:deb/debian/samba@2:4.5.16%2Bdfsg-1%2Bdeb9u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.5.16%252Bdfsg-1%252Bdeb9u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038160?format=api", "purl": "pkg:deb/debian/samba@2:4.9.5%2Bdfsg-5%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-5%252Bdeb10u3" } ], "aliases": [ "CVE-2017-14746" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rvux-gcuh-vuca" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47952?format=api", "vulnerability_id": "VCID-sd1b-cmgu-23h3", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10919.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10919.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10919", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01182", "scoring_system": "epss", "scoring_elements": "0.7876", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01182", "scoring_system": "epss", "scoring_elements": "0.78786", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01182", "scoring_system": "epss", "scoring_elements": "0.78769", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.80206", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.80223", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.80233", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.80352", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.80369", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.80329", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.80195", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.80261", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.80262", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.80265", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.80291", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.80298", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.80314", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01785", "scoring_system": "epss", "scoring_elements": "0.82664", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01785", "scoring_system": "epss", "scoring_elements": "0.8268", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10919" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10858", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10858" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10919", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10919" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610645", "reference_id": "1610645", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610645" }, { "reference_url": "https://security.gentoo.org/glsa/202003-52", "reference_id": "GLSA-202003-52", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-52" }, { "reference_url": "https://usn.ubuntu.com/3738-1/", "reference_id": "USN-3738-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3738-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036930?format=api", "purl": "pkg:deb/debian/samba@2:4.5.16%2Bdfsg-1%2Bdeb9u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.5.16%252Bdfsg-1%252Bdeb9u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038160?format=api", "purl": "pkg:deb/debian/samba@2:4.9.5%2Bdfsg-5%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-5%252Bdeb10u3" } ], "aliases": [ "CVE-2018-10919" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sd1b-cmgu-23h3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50102?format=api", "vulnerability_id": "VCID-sgp8-b3jx-cbh5", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which may allow execution of arbitrary code with root privileges.", "references": [ { "reference_url": "http://badlock.org/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://badlock.org/" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0611.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0611.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0613.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0613.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0619.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0619.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0624.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0624.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2115.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2115.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2115", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.22744", "scoring_system": "epss", "scoring_elements": "0.95901", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.22744", "scoring_system": "epss", "scoring_elements": "0.95909", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.22744", "scoring_system": "epss", "scoring_elements": "0.95904", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.25196", "scoring_system": "epss", "scoring_elements": "0.96167", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.25196", "scoring_system": "epss", "scoring_elements": "0.96177", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.25196", "scoring_system": "epss", "scoring_elements": "0.96181", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.25196", "scoring_system": "epss", "scoring_elements": "0.96185", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.25196", "scoring_system": "epss", "scoring_elements": "0.96149", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.25196", "scoring_system": "epss", "scoring_elements": "0.96187", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.25196", "scoring_system": "epss", "scoring_elements": "0.96196", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.25196", "scoring_system": "epss", "scoring_elements": "0.96201", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.25196", "scoring_system": "epss", "scoring_elements": "0.962", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.25196", "scoring_system": "epss", "scoring_elements": "0.96202", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.25196", "scoring_system": "epss", "scoring_elements": "0.96204", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.25196", "scoring_system": "epss", "scoring_elements": "0.96205", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.25196", "scoring_system": "epss", "scoring_elements": "0.96184", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.25196", "scoring_system": "epss", "scoring_elements": "0.96157", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.25196", "scoring_system": "epss", "scoring_elements": "0.96164", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2115" }, { "reference_url": "https://bto.bluecoat.com/security-advisory/sa122", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bto.bluecoat.com/security-advisory/sa122" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2114", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2114" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05087821", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05087821" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05082964", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05082964" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399" }, { "reference_url": "https://www.samba.org/samba/history/samba-4.2.10.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.samba.org/samba/history/samba-4.2.10.html" }, { "reference_url": "https://www.samba.org/samba/latest_news.html#4.4.2", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.samba.org/samba/latest_news.html#4.4.2" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2016-2115.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.samba.org/samba/security/CVE-2016-2115.html" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3548", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3548" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "reference_url": "http://www.securitytracker.com/id/1035533", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035533" }, { "reference_url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.458012", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.458012" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2950-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2950-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2950-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2950-2" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2950-3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2950-3" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2950-4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2950-4" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2950-5", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2950-5" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312084", "reference_id": "1312084", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312084" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.24:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.24:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.24:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.25:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.25:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.25:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.25:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.25:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.25:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.26:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.26:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.26:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2115", "reference_id": "CVE-2016-2115", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" }, { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2115" }, { "reference_url": "https://security.gentoo.org/glsa/201612-47", "reference_id": "GLSA-201612-47", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201612-47" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0611", "reference_id": "RHSA-2016:0611", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0611" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0612", "reference_id": "RHSA-2016:0612", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0612" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0613", "reference_id": "RHSA-2016:0613", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0613" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0614", "reference_id": "RHSA-2016:0614", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0614" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0618", "reference_id": "RHSA-2016:0618", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0618" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0619", "reference_id": "RHSA-2016:0619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0619" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0620", "reference_id": "RHSA-2016:0620", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0620" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0624", "reference_id": "RHSA-2016:0624", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0624" }, { "reference_url": "https://usn.ubuntu.com/2950-1/", "reference_id": "USN-2950-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2950-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571326?format=api", "purl": "pkg:deb/debian/samba@2:4.1.11%2Bdfsg-1~bpo70%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-26kr-61ku-ufe2" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-2q9w-nvzs-g7cp" }, { "vulnerability": "VCID-364y-r11r-u7cm" }, { "vulnerability": "VCID-45rp-gyp5-ukfb" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4mdk-6qnf-r7f7" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-4v8q-akyc-k7hn" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-66cs-n3ad-efgy" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-7xaa-6397-eyby" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-8uqh-s6xh-vycb" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9smc-af63-x7cg" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-a653-r4dy-bba9" }, { "vulnerability": "VCID-c9k2-wjf4-gbg6" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-e3gq-5a8s-akh4" }, { "vulnerability": "VCID-esjb-wmzz-fuc7" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fc2s-dwmh-w3gf" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-jd7n-tjpq-3uc9" }, { "vulnerability": "VCID-kkgp-9x4z-gue3" }, { "vulnerability": "VCID-kx2z-r7z8-qffr" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-p33p-zg9p-nyfy" }, { "vulnerability": "VCID-q3qf-qtjv-cyat" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qvhg-pkpb-sbcy" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-r6dg-tbre-5fer" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-sgp8-b3jx-cbh5" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tan8-tfz4-eudy" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vjmz-bp2f-bbc1" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-w3qg-p74x-jbff" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wk1w-4jdv-wqhn" }, { "vulnerability": "VCID-wm2r-x7yy-sbhb" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xjqj-hy9t-nfb7" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" }, { "vulnerability": "VCID-zrfg-a5m3-jkf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.1.11%252Bdfsg-1~bpo70%252B1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035709?format=api", "purl": "pkg:deb/debian/samba@2:4.2.14%2Bdfsg-0%2Bdeb8u9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-2q9w-nvzs-g7cp" }, { "vulnerability": "VCID-364y-r11r-u7cm" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4mdk-6qnf-r7f7" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-4v8q-akyc-k7hn" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-66cs-n3ad-efgy" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-8uqh-s6xh-vycb" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9smc-af63-x7cg" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-a653-r4dy-bba9" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-e3gq-5a8s-akh4" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-jd7n-tjpq-3uc9" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-p33p-zg9p-nyfy" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qvhg-pkpb-sbcy" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-sgp8-b3jx-cbh5" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-w3qg-p74x-jbff" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wk1w-4jdv-wqhn" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xjqj-hy9t-nfb7" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" }, { "vulnerability": "VCID-zrfg-a5m3-jkf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.2.14%252Bdfsg-0%252Bdeb8u9" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036930?format=api", "purl": "pkg:deb/debian/samba@2:4.5.16%2Bdfsg-1%2Bdeb9u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.5.16%252Bdfsg-1%252Bdeb9u2" } ], "aliases": [ "CVE-2016-2115" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sgp8-b3jx-cbh5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63790?format=api", "vulnerability_id": "VCID-tcbv-cguk-hfg2", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11103.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11103.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-11103", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05706", "scoring_system": "epss", "scoring_elements": "0.90483", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.05706", "scoring_system": "epss", "scoring_elements": "0.90446", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.05706", "scoring_system": "epss", "scoring_elements": "0.90445", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.05706", "scoring_system": "epss", "scoring_elements": "0.90442", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.05706", "scoring_system": "epss", "scoring_elements": "0.90454", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.05706", "scoring_system": "epss", "scoring_elements": "0.90471", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.06302", "scoring_system": "epss", "scoring_elements": "0.90958", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06302", "scoring_system": "epss", "scoring_elements": "0.90959", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.06302", "scoring_system": "epss", "scoring_elements": "0.90983", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.06302", "scoring_system": "epss", "scoring_elements": "0.90981", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.06302", "scoring_system": "epss", "scoring_elements": "0.90982", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.06302", "scoring_system": "epss", "scoring_elements": "0.90907", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06302", "scoring_system": "epss", "scoring_elements": "0.90912", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06302", "scoring_system": "epss", "scoring_elements": "0.90922", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06302", "scoring_system": "epss", "scoring_elements": "0.90932", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06302", "scoring_system": "epss", "scoring_elements": "0.90943", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06302", "scoring_system": "epss", "scoring_elements": "0.9095", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-11103" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11103", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11103" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1469976", "reference_id": "1469976", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1469976" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=868208", "reference_id": "868208", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=868208" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=868209", "reference_id": "868209", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=868209" }, { "reference_url": "https://usn.ubuntu.com/3353-1/", "reference_id": "USN-3353-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3353-1/" }, { "reference_url": "https://usn.ubuntu.com/3353-2/", "reference_id": "USN-3353-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3353-2/" }, { "reference_url": "https://usn.ubuntu.com/3353-3/", "reference_id": "USN-3353-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3353-3/" }, { "reference_url": "https://usn.ubuntu.com/3353-4/", "reference_id": "USN-3353-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3353-4/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035709?format=api", "purl": "pkg:deb/debian/samba@2:4.2.14%2Bdfsg-0%2Bdeb8u9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-2q9w-nvzs-g7cp" }, { "vulnerability": "VCID-364y-r11r-u7cm" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4mdk-6qnf-r7f7" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-4v8q-akyc-k7hn" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-66cs-n3ad-efgy" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-8uqh-s6xh-vycb" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9smc-af63-x7cg" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-a653-r4dy-bba9" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-e3gq-5a8s-akh4" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-jd7n-tjpq-3uc9" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-p33p-zg9p-nyfy" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qvhg-pkpb-sbcy" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-sgp8-b3jx-cbh5" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-w3qg-p74x-jbff" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wk1w-4jdv-wqhn" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xjqj-hy9t-nfb7" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" }, { "vulnerability": "VCID-zrfg-a5m3-jkf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.2.14%252Bdfsg-0%252Bdeb8u9" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036930?format=api", "purl": "pkg:deb/debian/samba@2:4.5.16%2Bdfsg-1%2Bdeb9u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.5.16%252Bdfsg-1%252Bdeb9u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038160?format=api", "purl": "pkg:deb/debian/samba@2:4.9.5%2Bdfsg-5%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-5%252Bdeb10u3" } ], "aliases": [ "CVE-2017-11103" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tcbv-cguk-hfg2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50098?format=api", "vulnerability_id": "VCID-w3qg-p74x-jbff", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which may allow execution of arbitrary code with root privileges.", "references": [ { "reference_url": "http://badlock.org/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://badlock.org/" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00046.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00046.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0611.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0611.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0613.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0613.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0619.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0619.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0621.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0621.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0623.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0623.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0624.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0624.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0625.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0625.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2111.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2111.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2111", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02808", "scoring_system": "epss", "scoring_elements": "0.86215", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.02808", "scoring_system": "epss", "scoring_elements": "0.86194", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.02808", "scoring_system": "epss", "scoring_elements": "0.86234", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.03786", "scoring_system": "epss", "scoring_elements": "0.88041", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03786", "scoring_system": "epss", "scoring_elements": "0.8806", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03786", "scoring_system": "epss", "scoring_elements": "0.88066", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03786", "scoring_system": "epss", "scoring_elements": "0.88076", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03786", "scoring_system": "epss", "scoring_elements": "0.88011", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03786", "scoring_system": "epss", "scoring_elements": "0.8807", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03786", "scoring_system": "epss", "scoring_elements": "0.88083", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03786", "scoring_system": "epss", "scoring_elements": "0.88081", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03786", "scoring_system": "epss", "scoring_elements": "0.88099", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03786", "scoring_system": "epss", "scoring_elements": "0.88104", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.03786", "scoring_system": "epss", "scoring_elements": "0.88103", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.03786", "scoring_system": "epss", "scoring_elements": "0.88069", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03786", "scoring_system": "epss", "scoring_elements": "0.88021", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03786", "scoring_system": "epss", "scoring_elements": "0.88035", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2111" }, { "reference_url": "https://bto.bluecoat.com/security-advisory/sa122", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bto.bluecoat.com/security-advisory/sa122" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2114", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2114" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05087821", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05087821" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05082964", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05082964" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399" }, { "reference_url": "https://www.samba.org/samba/history/samba-4.2.10.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.samba.org/samba/history/samba-4.2.10.html" }, { "reference_url": "https://www.samba.org/samba/latest_news.html#4.4.2", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.samba.org/samba/latest_news.html#4.4.2" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2016-2111.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.samba.org/samba/security/CVE-2016-2111.html" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3548", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3548" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "reference_url": "http://www.securitytracker.com/id/1035533", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035533" }, { "reference_url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.458012", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.458012" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2950-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2950-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2950-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2950-2" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2950-3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2950-3" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2950-4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2950-4" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2950-5", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2950-5" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1311902", "reference_id": "1311902", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1311902" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.24:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.24:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.24:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.25:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.25:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.25:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.25:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.25:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.25:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.26:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.26:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.26:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2111", "reference_id": "CVE-2016-2111", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:M/Au:N/C:P/I:P/A:N" }, { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2111" }, { "reference_url": "https://security.gentoo.org/glsa/201612-47", "reference_id": "GLSA-201612-47", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201612-47" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0611", "reference_id": "RHSA-2016:0611", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0611" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0612", "reference_id": "RHSA-2016:0612", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0612" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0613", "reference_id": "RHSA-2016:0613", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0613" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0614", "reference_id": "RHSA-2016:0614", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0614" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0618", "reference_id": "RHSA-2016:0618", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0618" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0619", "reference_id": "RHSA-2016:0619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0619" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0620", "reference_id": "RHSA-2016:0620", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0620" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0621", "reference_id": "RHSA-2016:0621", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0621" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0623", "reference_id": "RHSA-2016:0623", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0623" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0624", "reference_id": "RHSA-2016:0624", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0624" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0625", "reference_id": "RHSA-2016:0625", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0625" }, { "reference_url": "https://usn.ubuntu.com/2950-1/", "reference_id": "USN-2950-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2950-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571326?format=api", "purl": "pkg:deb/debian/samba@2:4.1.11%2Bdfsg-1~bpo70%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-26kr-61ku-ufe2" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-2q9w-nvzs-g7cp" }, { "vulnerability": "VCID-364y-r11r-u7cm" }, { "vulnerability": "VCID-45rp-gyp5-ukfb" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4mdk-6qnf-r7f7" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-4v8q-akyc-k7hn" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-66cs-n3ad-efgy" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-7xaa-6397-eyby" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-8uqh-s6xh-vycb" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9smc-af63-x7cg" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-a653-r4dy-bba9" }, { "vulnerability": "VCID-c9k2-wjf4-gbg6" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-e3gq-5a8s-akh4" }, { "vulnerability": "VCID-esjb-wmzz-fuc7" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fc2s-dwmh-w3gf" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-jd7n-tjpq-3uc9" }, { "vulnerability": "VCID-kkgp-9x4z-gue3" }, { "vulnerability": "VCID-kx2z-r7z8-qffr" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-p33p-zg9p-nyfy" }, { "vulnerability": "VCID-q3qf-qtjv-cyat" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qvhg-pkpb-sbcy" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-r6dg-tbre-5fer" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-sgp8-b3jx-cbh5" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tan8-tfz4-eudy" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vjmz-bp2f-bbc1" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-w3qg-p74x-jbff" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wk1w-4jdv-wqhn" }, { "vulnerability": "VCID-wm2r-x7yy-sbhb" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xjqj-hy9t-nfb7" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" }, { "vulnerability": "VCID-zrfg-a5m3-jkf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.1.11%252Bdfsg-1~bpo70%252B1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035709?format=api", "purl": "pkg:deb/debian/samba@2:4.2.14%2Bdfsg-0%2Bdeb8u9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-2q9w-nvzs-g7cp" }, { "vulnerability": "VCID-364y-r11r-u7cm" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4mdk-6qnf-r7f7" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-4v8q-akyc-k7hn" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-66cs-n3ad-efgy" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-8uqh-s6xh-vycb" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9smc-af63-x7cg" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-a653-r4dy-bba9" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-e3gq-5a8s-akh4" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-jd7n-tjpq-3uc9" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-p33p-zg9p-nyfy" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qvhg-pkpb-sbcy" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-sgp8-b3jx-cbh5" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-w3qg-p74x-jbff" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wk1w-4jdv-wqhn" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xjqj-hy9t-nfb7" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" }, { "vulnerability": "VCID-zrfg-a5m3-jkf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.2.14%252Bdfsg-0%252Bdeb8u9" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036930?format=api", "purl": "pkg:deb/debian/samba@2:4.5.16%2Bdfsg-1%2Bdeb9u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.5.16%252Bdfsg-1%252Bdeb9u2" } ], "aliases": [ "CVE-2016-2111" ], "risk_score": 2.9, "exploitability": "0.5", "weighted_severity": "5.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w3qg-p74x-jbff" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46497?format=api", "vulnerability_id": "VCID-wbrt-6f84-p3gu", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which may allow remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1057.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1057.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1057", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07722", "scoring_system": "epss", "scoring_elements": "0.9189", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07722", "scoring_system": "epss", "scoring_elements": "0.91899", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07722", "scoring_system": "epss", "scoring_elements": "0.91906", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07722", "scoring_system": "epss", "scoring_elements": "0.91913", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07722", "scoring_system": "epss", "scoring_elements": "0.91926", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07722", "scoring_system": "epss", "scoring_elements": "0.91931", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07722", "scoring_system": "epss", "scoring_elements": "0.91935", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07722", "scoring_system": "epss", "scoring_elements": "0.91934", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07722", "scoring_system": "epss", "scoring_elements": "0.9195", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.07722", "scoring_system": "epss", "scoring_elements": "0.91946", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.07722", "scoring_system": "epss", "scoring_elements": "0.91943", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.07722", "scoring_system": "epss", "scoring_elements": "0.91948", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.07722", "scoring_system": "epss", "scoring_elements": "0.91947", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.07722", "scoring_system": "epss", "scoring_elements": "0.91942", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.07722", "scoring_system": "epss", "scoring_elements": "0.91955", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.07722", "scoring_system": "epss", "scoring_elements": "0.91969", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.07722", "scoring_system": "epss", "scoring_elements": "0.91978", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1057" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1050", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1050" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1057", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1057" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553553", "reference_id": "1553553", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553553" }, { "reference_url": "https://security.archlinux.org/ASA-201803-10", "reference_id": "ASA-201803-10", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201803-10" }, { "reference_url": "https://security.archlinux.org/AVG-651", "reference_id": "AVG-651", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-651" }, { "reference_url": "https://security.gentoo.org/glsa/201805-07", "reference_id": "GLSA-201805-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201805-07" }, { "reference_url": "https://usn.ubuntu.com/3595-1/", "reference_id": "USN-3595-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3595-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036930?format=api", "purl": "pkg:deb/debian/samba@2:4.5.16%2Bdfsg-1%2Bdeb9u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.5.16%252Bdfsg-1%252Bdeb9u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038160?format=api", "purl": "pkg:deb/debian/samba@2:4.9.5%2Bdfsg-5%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-5%252Bdeb10u3" } ], "aliases": [ "CVE-2018-1057" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wbrt-6f84-p3gu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79404?format=api", "vulnerability_id": "VCID-wdp2-qcyp-eucu", "summary": "security update", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00050.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00050.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00106.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00106.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3880.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3880.json" }, { "reference_url": "https://access.redhat.com/security/cve/cve-2019-3880", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/security/cve/cve-2019-3880" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-3880", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03388", "scoring_system": "epss", "scoring_elements": "0.87346", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03388", "scoring_system": "epss", "scoring_elements": "0.8748", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.03388", "scoring_system": "epss", "scoring_elements": "0.87427", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03388", "scoring_system": "epss", "scoring_elements": "0.87434", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.03388", "scoring_system": "epss", "scoring_elements": "0.87449", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.03388", "scoring_system": "epss", "scoring_elements": "0.87462", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.03388", "scoring_system": "epss", "scoring_elements": "0.87356", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03388", "scoring_system": "epss", "scoring_elements": "0.87371", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03388", "scoring_system": "epss", "scoring_elements": "0.87389", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03388", "scoring_system": "epss", "scoring_elements": "0.87396", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03388", "scoring_system": "epss", "scoring_elements": "0.87408", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03388", "scoring_system": "epss", "scoring_elements": "0.87403", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03388", "scoring_system": "epss", "scoring_elements": "0.87399", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03388", "scoring_system": "epss", "scoring_elements": "0.87414", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03388", "scoring_system": "epss", "scoring_elements": "0.87417", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03388", "scoring_system": "epss", "scoring_elements": "0.87411", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-3880" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3880", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3880" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3880", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3880" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00013.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00013.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6354GALK73CZWQKFUG7AWB6EIEGFMF62/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6354GALK73CZWQKFUG7AWB6EIEGFMF62/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HSRLRO7BPRFETVFZ4TVJL2VFZEPHKJY4/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HSRLRO7BPRFETVFZ4TVJL2VFZEPHKJY4/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JTJVFA3RZ6G2IZDTVKLHRMX6QBYA4GPA/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JTJVFA3RZ6G2IZDTVKLHRMX6QBYA4GPA/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190411-0004/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20190411-0004/" }, { "reference_url": "https://support.f5.com/csp/article/K20804356", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.f5.com/csp/article/K20804356" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2019-3880.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.samba.org/samba/security/CVE-2019-3880.html" }, { "reference_url": "https://www.synology.com/security/advisory/Synology_SA_19_15", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.synology.com/security/advisory/Synology_SA_19_15" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1691518", "reference_id": "1691518", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1691518" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:gluster_storage:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:gluster_storage:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:gluster_storage:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3880", "reference_id": "CVE-2019-3880", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:P/A:P" }, { "value": "4.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" }, { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3880" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1966", "reference_id": "RHSA-2019:1966", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1966" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1967", "reference_id": "RHSA-2019:1967", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1967" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2099", "reference_id": "RHSA-2019:2099", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2099" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3582", "reference_id": "RHSA-2019:3582", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3582" }, { "reference_url": "https://usn.ubuntu.com/3939-1/", "reference_id": "USN-3939-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3939-1/" }, { "reference_url": "https://usn.ubuntu.com/3939-2/", "reference_id": "USN-3939-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3939-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036930?format=api", "purl": "pkg:deb/debian/samba@2:4.5.16%2Bdfsg-1%2Bdeb9u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.5.16%252Bdfsg-1%252Bdeb9u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038160?format=api", "purl": "pkg:deb/debian/samba@2:4.9.5%2Bdfsg-5%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-5%252Bdeb10u3" } ], "aliases": [ "CVE-2019-3880" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wdp2-qcyp-eucu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46492?format=api", "vulnerability_id": "VCID-wk1w-4jdv-wqhn", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which may allow remote execution of arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00060.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00060.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1486.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-1486.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1487.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-1487.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1494.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-1494.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2119.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2119.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2119", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81193", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81386", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81328", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81345", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81364", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81201", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81224", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81252", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81257", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81278", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81264", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81256", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81293", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81294", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81316", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81323", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2119" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2119", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2119" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2123", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2123" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2125", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2125" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2126" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:M/Au:N/C:P/I:P/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2016-2119.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.samba.org/samba/security/CVE-2016-2119.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html" }, { "reference_url": "http://www.securityfocus.com/bid/91700", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/91700" }, { "reference_url": "http://www.securitytracker.com/id/1036244", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1036244" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1351955", "reference_id": "1351955", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1351955" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=830195", "reference_id": "830195", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=830195" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2119", "reference_id": "CVE-2016-2119", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2119" }, { "reference_url": "https://security.gentoo.org/glsa/201805-07", "reference_id": "GLSA-201805-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201805-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1486", "reference_id": "RHSA-2016:1486", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1486" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1487", "reference_id": "RHSA-2016:1487", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1487" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1494", "reference_id": "RHSA-2016:1494", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1494" }, { "reference_url": "https://usn.ubuntu.com/3092-1/", "reference_id": "USN-3092-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3092-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035709?format=api", "purl": "pkg:deb/debian/samba@2:4.2.14%2Bdfsg-0%2Bdeb8u9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-2q9w-nvzs-g7cp" }, { "vulnerability": "VCID-364y-r11r-u7cm" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4mdk-6qnf-r7f7" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-4v8q-akyc-k7hn" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-66cs-n3ad-efgy" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-8uqh-s6xh-vycb" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9smc-af63-x7cg" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-a653-r4dy-bba9" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-e3gq-5a8s-akh4" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-jd7n-tjpq-3uc9" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-p33p-zg9p-nyfy" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qvhg-pkpb-sbcy" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-sgp8-b3jx-cbh5" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-w3qg-p74x-jbff" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wk1w-4jdv-wqhn" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xjqj-hy9t-nfb7" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" }, { "vulnerability": "VCID-zrfg-a5m3-jkf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.2.14%252Bdfsg-0%252Bdeb8u9" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036930?format=api", "purl": "pkg:deb/debian/samba@2:4.5.16%2Bdfsg-1%2Bdeb9u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.5.16%252Bdfsg-1%252Bdeb9u2" } ], "aliases": [ "CVE-2016-2119" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wk1w-4jdv-wqhn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47956?format=api", "vulnerability_id": "VCID-wpvs-jabz-2ye3", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16841.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16841.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16841", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.91489", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.91592", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.91569", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.91582", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.91496", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.91503", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.9151", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.91524", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.9153", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.91535", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.91536", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.91534", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.91557", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.91552", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.9156", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.91558", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14629", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14629" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16841", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16851" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1642545", "reference_id": "1642545", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1642545" }, { "reference_url": "https://security.archlinux.org/ASA-201811-22", "reference_id": "ASA-201811-22", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201811-22" }, { "reference_url": "https://security.archlinux.org/AVG-823", "reference_id": "AVG-823", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-823" }, { "reference_url": "https://security.gentoo.org/glsa/202003-52", "reference_id": "GLSA-202003-52", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-52" }, { "reference_url": "https://usn.ubuntu.com/3827-1/", "reference_id": "USN-3827-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3827-1/" }, { "reference_url": "https://usn.ubuntu.com/3827-2/", "reference_id": "USN-3827-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3827-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036930?format=api", "purl": "pkg:deb/debian/samba@2:4.5.16%2Bdfsg-1%2Bdeb9u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.5.16%252Bdfsg-1%252Bdeb9u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038160?format=api", "purl": "pkg:deb/debian/samba@2:4.9.5%2Bdfsg-5%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-5%252Bdeb10u3" } ], "aliases": [ "CVE-2018-16841" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wpvs-jabz-2ye3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81503?format=api", "vulnerability_id": "VCID-xjqj-hy9t-nfb7", "summary": "security update", "references": [ { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0494.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2017-0494.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0495.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2017-0495.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0662.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2017-0662.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0744.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2017-0744.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2126.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2126.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2126", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04684", "scoring_system": "epss", "scoring_elements": "0.89297", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04684", "scoring_system": "epss", "scoring_elements": "0.89416", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.04684", "scoring_system": "epss", "scoring_elements": "0.89373", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.04684", "scoring_system": "epss", "scoring_elements": "0.89376", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.04684", "scoring_system": "epss", "scoring_elements": "0.89385", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.04684", "scoring_system": "epss", "scoring_elements": "0.89403", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.04684", "scoring_system": "epss", "scoring_elements": "0.89302", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04684", "scoring_system": "epss", "scoring_elements": "0.89316", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04684", "scoring_system": "epss", "scoring_elements": "0.89318", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04684", "scoring_system": "epss", "scoring_elements": "0.89335", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04684", "scoring_system": "epss", "scoring_elements": "0.89339", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04684", "scoring_system": "epss", "scoring_elements": "0.89348", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04684", "scoring_system": "epss", "scoring_elements": "0.89345", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04684", "scoring_system": "epss", "scoring_elements": "0.89341", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04684", "scoring_system": "epss", "scoring_elements": "0.89356", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04684", "scoring_system": "epss", "scoring_elements": "0.89355", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04684", "scoring_system": "epss", "scoring_elements": "0.89351", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04684", "scoring_system": "epss", "scoring_elements": "0.89369", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2119", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2119" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2123", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2123" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2125", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2125" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2126" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.3", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:M/Au:S/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43730", "reference_id": "", "reference_type": "", "scores": [], "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43730" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2016-2126.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.samba.org/samba/security/CVE-2016-2126.html" }, { "reference_url": "http://www.securityfocus.com/bid/94994", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/94994" }, { "reference_url": "http://www.securitytracker.com/id/1037495", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1037495" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403115", "reference_id": "1403115", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403115" }, { "reference_url": "https://security.archlinux.org/ASA-201612-19", "reference_id": "ASA-201612-19", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201612-19" }, { "reference_url": "https://security.archlinux.org/AVG-111", "reference_id": "AVG-111", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-111" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2126", "reference_id": "CVE-2016-2126", "reference_type": "", "scores": [ { "value": "4.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P" }, { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2126" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0494", "reference_id": "RHSA-2017:0494", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0494" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0495", "reference_id": "RHSA-2017:0495", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0495" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0662", "reference_id": "RHSA-2017:0662", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0662" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0744", "reference_id": "RHSA-2017:0744", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0744" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1265", "reference_id": "RHSA-2017:1265", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1265" }, { "reference_url": "https://usn.ubuntu.com/3158-1/", "reference_id": "USN-3158-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3158-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035709?format=api", "purl": "pkg:deb/debian/samba@2:4.2.14%2Bdfsg-0%2Bdeb8u9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-2q9w-nvzs-g7cp" }, { "vulnerability": "VCID-364y-r11r-u7cm" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4mdk-6qnf-r7f7" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-4v8q-akyc-k7hn" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-66cs-n3ad-efgy" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-8uqh-s6xh-vycb" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9smc-af63-x7cg" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-a653-r4dy-bba9" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-e3gq-5a8s-akh4" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-jd7n-tjpq-3uc9" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-p33p-zg9p-nyfy" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qvhg-pkpb-sbcy" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-sgp8-b3jx-cbh5" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-w3qg-p74x-jbff" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wk1w-4jdv-wqhn" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xjqj-hy9t-nfb7" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" }, { "vulnerability": "VCID-zrfg-a5m3-jkf3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.2.14%252Bdfsg-0%252Bdeb8u9" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036930?format=api", "purl": "pkg:deb/debian/samba@2:4.5.16%2Bdfsg-1%2Bdeb9u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.5.16%252Bdfsg-1%252Bdeb9u2" } ], "aliases": [ "CVE-2016-2126" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xjqj-hy9t-nfb7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84574?format=api", "vulnerability_id": "VCID-zrfg-a5m3-jkf3", "summary": "samba: fd_open_atomic infinite loop due to wrong handling of dangling symlinks", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9461.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9461.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9461", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03382", "scoring_system": "epss", "scoring_elements": "0.87336", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03382", "scoring_system": "epss", "scoring_elements": "0.87346", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03382", "scoring_system": "epss", "scoring_elements": "0.87361", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03382", "scoring_system": "epss", "scoring_elements": "0.87379", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03382", "scoring_system": "epss", "scoring_elements": "0.87386", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03382", "scoring_system": "epss", "scoring_elements": "0.87398", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03382", "scoring_system": "epss", "scoring_elements": "0.87393", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03382", "scoring_system": "epss", "scoring_elements": "0.87389", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03382", "scoring_system": "epss", "scoring_elements": "0.87403", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03382", "scoring_system": "epss", "scoring_elements": "0.87406", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03382", "scoring_system": "epss", "scoring_elements": "0.87401", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03382", "scoring_system": "epss", "scoring_elements": "0.87417", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03382", "scoring_system": "epss", "scoring_elements": "0.87424", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.03382", "scoring_system": "epss", "scoring_elements": "0.87438", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.03382", "scoring_system": "epss", "scoring_elements": "0.87452", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.03382", "scoring_system": "epss", "scoring_elements": "0.8747", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9461" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9461", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9461" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459464", "reference_id": "1459464", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459464" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864291", "reference_id": "864291", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864291" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1950", "reference_id": "RHSA-2017:1950", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1950" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2338", "reference_id": "RHSA-2017:2338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2338" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2778", "reference_id": "RHSA-2017:2778", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2778" }, { "reference_url": "https://usn.ubuntu.com/3348-1/", "reference_id": "USN-3348-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3348-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036930?format=api", "purl": "pkg:deb/debian/samba@2:4.5.16%2Bdfsg-1%2Bdeb9u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-29k5-64fs-ufcd" }, { "vulnerability": "VCID-2dm7-xt4e-wkex" }, { "vulnerability": "VCID-2gkd-vubu-j7fd" }, { "vulnerability": "VCID-2ks6-vhre-6ke2" }, { "vulnerability": "VCID-47k4-8k1s-zff2" }, { "vulnerability": "VCID-4qm6-a9un-nyda" }, { "vulnerability": "VCID-55zj-6b4s-8ker" }, { "vulnerability": "VCID-5kvv-rbas-tbh9" }, { "vulnerability": "VCID-5vyg-1jzr-ebh8" }, { "vulnerability": "VCID-745n-wca7-d7fh" }, { "vulnerability": "VCID-76sz-d2yt-buek" }, { "vulnerability": "VCID-7bb1-3ny6-rbbv" }, { "vulnerability": "VCID-88mw-c7mc-jugp" }, { "vulnerability": "VCID-9cyh-d77a-vyhj" }, { "vulnerability": "VCID-9t1m-6chr-e3dt" }, { "vulnerability": "VCID-ce1t-wb2k-2uct" }, { "vulnerability": "VCID-cgez-urtv-qbhq" }, { "vulnerability": "VCID-cjqf-muwp-3qbq" }, { "vulnerability": "VCID-crh2-zv3e-pfaa" }, { "vulnerability": "VCID-dzux-xe2s-fyhg" }, { "vulnerability": "VCID-ez9s-vn2t-w7a6" }, { "vulnerability": "VCID-ezk6-jy86-y3h4" }, { "vulnerability": "VCID-f772-3dtd-wba8" }, { "vulnerability": "VCID-f9hv-k2xk-puhq" }, { "vulnerability": "VCID-fh3j-efv1-tybp" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-fxgm-p1bm-r7ev" }, { "vulnerability": "VCID-gs98-hcdd-2yf9" }, { "vulnerability": "VCID-h2pu-vhv4-yfhx" }, { "vulnerability": "VCID-he7x-3928-fffk" }, { "vulnerability": "VCID-hnhm-ud2a-nugz" }, { "vulnerability": "VCID-hzy4-16j5-8qcf" }, { "vulnerability": "VCID-j9a3-25xa-c3g3" }, { "vulnerability": "VCID-m44e-rw2w-vuhj" }, { "vulnerability": "VCID-mbcb-7zmf-2yah" }, { "vulnerability": "VCID-mgaq-qjdw-fke4" }, { "vulnerability": "VCID-mw6j-fkm4-pkg2" }, { "vulnerability": "VCID-nted-1p4h-y7fz" }, { "vulnerability": "VCID-p1se-92ae-t3b5" }, { "vulnerability": "VCID-qpmw-6wg8-gbfs" }, { "vulnerability": "VCID-qt4e-73xg-bqde" }, { "vulnerability": "VCID-qx51-4w39-hyd3" }, { "vulnerability": "VCID-rgu3-rgej-aucp" }, { "vulnerability": "VCID-rnfg-1cgy-jbaq" }, { "vulnerability": "VCID-rphh-hzna-nbgf" }, { "vulnerability": "VCID-rvux-gcuh-vuca" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-s6ma-9h2y-hyc4" }, { "vulnerability": "VCID-sd1b-cmgu-23h3" }, { "vulnerability": "VCID-smxs-4de1-nfec" }, { "vulnerability": "VCID-t3zy-v34p-7uen" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-tk1x-bex4-8kbz" }, { "vulnerability": "VCID-tskp-1ra2-wyez" }, { "vulnerability": "VCID-v39j-84q1-j3ef" }, { "vulnerability": "VCID-vg7n-k8px-ayd5" }, { "vulnerability": "VCID-vnc5-neuk-m3ar" }, { "vulnerability": "VCID-vu43-fq85-a7eq" }, { "vulnerability": "VCID-wbrt-6f84-p3gu" }, { "vulnerability": "VCID-wdp2-qcyp-eucu" }, { "vulnerability": "VCID-wfhc-ehpe-abaq" }, { "vulnerability": "VCID-wpvs-jabz-2ye3" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" }, { "vulnerability": "VCID-xwke-mduk-kyga" }, { "vulnerability": "VCID-xyfs-p969-syfp" }, { "vulnerability": "VCID-ycau-9h17-quf3" }, { "vulnerability": "VCID-ycm6-j6gt-p7ar" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.5.16%252Bdfsg-1%252Bdeb9u2" } ], "aliases": [ "CVE-2017-9461" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zrfg-a5m3-jkf3" } ], "risk_score": "10.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.5.16%252Bdfsg-1%252Bdeb9u2" }