Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/465428?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/465428?format=api", "purl": "pkg:apk/alpine/samba@4.15.12-r0?arch=s390x&distroversion=v3.16&reponame=main", "type": "apk", "namespace": "alpine", "name": "samba", "version": "4.15.12-r0", "qualifiers": { "arch": "s390x", "distroversion": "v3.16", "reponame": "main" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "4.15.13-r0", "latest_non_vulnerable_version": "4.15.13-r0", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47300?format=api", "vulnerability_id": "VCID-3du2-evy8-jfa1", "summary": "Multiple vulnerabilities have been discovered in MIT krb5, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42898.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42898.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42898", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.08257", "scoring_system": "epss", "scoring_elements": "0.92245", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.08257", "scoring_system": "epss", "scoring_elements": "0.9225", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.08257", "scoring_system": "epss", "scoring_elements": "0.92249", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.08734", "scoring_system": "epss", "scoring_elements": "0.92524", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.08734", "scoring_system": "epss", "scoring_elements": "0.92515", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.08889", "scoring_system": "epss", "scoring_elements": "0.92564", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.08889", "scoring_system": "epss", "scoring_elements": "0.92532", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.08889", "scoring_system": "epss", "scoring_elements": "0.92575", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.08889", "scoring_system": "epss", "scoring_elements": "0.92565", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.08889", "scoring_system": "epss", "scoring_elements": "0.9254", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.08889", "scoring_system": "epss", "scoring_elements": "0.92542", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.08889", "scoring_system": "epss", "scoring_elements": "0.92553", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.08889", "scoring_system": "epss", "scoring_elements": "0.92558", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42898" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187", "reference_id": "1024187", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024267", "reference_id": "1024267", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024267" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140960", "reference_id": "2140960", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140960" }, { "reference_url": "https://web.mit.edu/kerberos/advisories/", "reference_id": "advisories", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/" } ], "url": "https://web.mit.edu/kerberos/advisories/" }, { "reference_url": "https://security.archlinux.org/AVG-2828", "reference_id": "AVG-2828", "reference_type": "", "scores": [ { "value": "Unknown", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2828" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2022-42898.html", "reference_id": "CVE-2022-42898.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/" } ], "url": "https://www.samba.org/samba/security/CVE-2022-42898.html" }, { "reference_url": "https://github.com/krb5/krb5/commit/ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583", "reference_id": "ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/" } ], "url": "https://github.com/krb5/krb5/commit/ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583" }, { "reference_url": "https://github.com/heimdal/heimdal/security/advisories/GHSA-64mq-fvfj-5x3c", "reference_id": "GHSA-64mq-fvfj-5x3c", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/" } ], "url": "https://github.com/heimdal/heimdal/security/advisories/GHSA-64mq-fvfj-5x3c" }, { "reference_url": "https://security.gentoo.org/glsa/202309-06", "reference_id": "GLSA-202309-06", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/" } ], "url": "https://security.gentoo.org/glsa/202309-06" }, { "reference_url": "https://security.gentoo.org/glsa/202310-06", "reference_id": "GLSA-202310-06", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/" } ], "url": "https://security.gentoo.org/glsa/202310-06" }, { "reference_url": "https://security.gentoo.org/glsa/202405-11", "reference_id": "GLSA-202405-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-11" }, { "reference_url": "https://web.mit.edu/kerberos/krb5-1.19/", "reference_id": "krb5-1.19", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/" } ], "url": "https://web.mit.edu/kerberos/krb5-1.19/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230216-0008/", "reference_id": "ntap-20230216-0008", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230216-0008/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230223-0001/", "reference_id": "ntap-20230223-0001", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230223-0001/" }, { "reference_url": "https://web.mit.edu/kerberos/krb5-1.20/README-1.20.1.txt", "reference_id": "README-1.20.1.txt", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/" } ], "url": "https://web.mit.edu/kerberos/krb5-1.20/README-1.20.1.txt" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8637", "reference_id": "RHSA-2022:8637", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8637" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8638", "reference_id": "RHSA-2022:8638", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8638" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8639", "reference_id": "RHSA-2022:8639", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8639" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8640", "reference_id": "RHSA-2022:8640", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8640" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8641", "reference_id": "RHSA-2022:8641", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8641" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8648", "reference_id": "RHSA-2022:8648", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8648" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8662", "reference_id": "RHSA-2022:8662", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8662" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8663", "reference_id": "RHSA-2022:8663", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8663" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8669", "reference_id": "RHSA-2022:8669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8669" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:9029", "reference_id": "RHSA-2022:9029", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:9029" }, { "reference_url": "https://bugzilla.samba.org/show_bug.cgi?id=15203", "reference_id": "show_bug.cgi?id=15203", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/" } ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=15203" }, { "reference_url": "https://usn.ubuntu.com/5800-1/", "reference_id": "USN-5800-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5800-1/" }, { "reference_url": "https://usn.ubuntu.com/5822-1/", "reference_id": "USN-5822-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5822-1/" }, { "reference_url": "https://usn.ubuntu.com/5828-1/", "reference_id": "USN-5828-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5828-1/" }, { "reference_url": "https://usn.ubuntu.com/5936-1/", "reference_id": "USN-5936-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5936-1/" }, { "reference_url": "https://usn.ubuntu.com/7582-1/", "reference_id": "USN-7582-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7582-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/465428?format=api", "purl": "pkg:apk/alpine/samba@4.15.12-r0?arch=s390x&distroversion=v3.16&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/samba@4.15.12-r0%3Farch=s390x&distroversion=v3.16&reponame=main" } ], "aliases": [ "CVE-2022-42898" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3du2-evy8-jfa1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48485?format=api", "vulnerability_id": "VCID-7bb1-3ny6-rbbv", "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44142.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44142.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-44142", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.30651", "scoring_system": "epss", "scoring_elements": "0.96699", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.30651", "scoring_system": "epss", "scoring_elements": "0.96687", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.30651", "scoring_system": "epss", "scoring_elements": "0.96697", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.32269", "scoring_system": "epss", "scoring_elements": "0.96831", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.32269", "scoring_system": "epss", "scoring_elements": "0.96823", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.35695", "scoring_system": "epss", "scoring_elements": "0.97094", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.37405", "scoring_system": "epss", "scoring_elements": "0.9718", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.37405", "scoring_system": "epss", "scoring_elements": "0.97198", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.37405", "scoring_system": "epss", "scoring_elements": "0.97191", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.37405", "scoring_system": "epss", "scoring_elements": "0.97188", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.37405", "scoring_system": "epss", "scoring_elements": "0.97175", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.37405", "scoring_system": "epss", "scoring_elements": "0.97179", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.37405", "scoring_system": "epss", "scoring_elements": "0.97181", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.37405", "scoring_system": "epss", "scoring_elements": "0.97197", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.37405", "scoring_system": "epss", "scoring_elements": "0.97195", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-44142" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44142", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44142" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004693", "reference_id": "1004693", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004693" }, { "reference_url": "https://kb.cert.org/vuls/id/119678", "reference_id": "119678", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:30:59Z/" } ], "url": "https://kb.cert.org/vuls/id/119678" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046146", "reference_id": "2046146", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046146" }, { "reference_url": "https://security.archlinux.org/AVG-2648", "reference_id": "AVG-2648", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2648" }, { "reference_url": "https://www.zerodayinitiative.com/blog/2022/2/1/cve-2021-44142-details-on-a-samba-code-execution-bug-demonstrated-at-pwn2own-austin", "reference_id": "cve-2021-44142-details-on-a-samba-code-execution-bug-demonstrated-at-pwn2own-austin", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:30:59Z/" } ], "url": "https://www.zerodayinitiative.com/blog/2022/2/1/cve-2021-44142-details-on-a-samba-code-execution-bug-demonstrated-at-pwn2own-austin" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2021-44142.html", "reference_id": "CVE-2021-44142.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:30:59Z/" } ], "url": "https://www.samba.org/samba/security/CVE-2021-44142.html" }, { "reference_url": "https://security.gentoo.org/glsa/202309-06", "reference_id": "GLSA-202309-06", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:30:59Z/" } ], "url": "https://security.gentoo.org/glsa/202309-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0328", "reference_id": "RHSA-2022:0328", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0328" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0329", "reference_id": "RHSA-2022:0329", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0329" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0330", "reference_id": "RHSA-2022:0330", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0330" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0331", "reference_id": "RHSA-2022:0331", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0331" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0332", "reference_id": "RHSA-2022:0332", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0332" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0457", "reference_id": "RHSA-2022:0457", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0457" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0458", "reference_id": "RHSA-2022:0458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0663", "reference_id": "RHSA-2022:0663", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0663" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0664", "reference_id": "RHSA-2022:0664", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0664" }, { "reference_url": "https://bugzilla.samba.org/show_bug.cgi?id=14914", "reference_id": "show_bug.cgi?id=14914", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:30:59Z/" } ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=14914" }, { "reference_url": "https://usn.ubuntu.com/5260-1/", "reference_id": "USN-5260-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5260-1/" }, { "reference_url": "https://usn.ubuntu.com/5260-2/", "reference_id": "USN-5260-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5260-2/" }, { "reference_url": "https://usn.ubuntu.com/5260-3/", "reference_id": "USN-5260-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5260-3/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/465428?format=api", "purl": "pkg:apk/alpine/samba@4.15.12-r0?arch=s390x&distroversion=v3.16&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/samba@4.15.12-r0%3Farch=s390x&distroversion=v3.16&reponame=main" } ], "aliases": [ "CVE-2021-44142" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7bb1-3ny6-rbbv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48492?format=api", "vulnerability_id": "VCID-7rcm-14da-ybdv", "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3592.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3592.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3592", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00635", "scoring_system": "epss", "scoring_elements": "0.70458", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00635", "scoring_system": "epss", "scoring_elements": "0.70422", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00635", "scoring_system": "epss", "scoring_elements": "0.70407", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00635", "scoring_system": "epss", "scoring_elements": "0.70393", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00635", "scoring_system": "epss", "scoring_elements": "0.70435", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00635", "scoring_system": "epss", "scoring_elements": "0.70444", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00635", "scoring_system": "epss", "scoring_elements": "0.70424", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00635", "scoring_system": "epss", "scoring_elements": "0.70475", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00635", "scoring_system": "epss", "scoring_elements": "0.70484", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00635", "scoring_system": "epss", "scoring_elements": "0.7036", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00635", "scoring_system": "epss", "scoring_elements": "0.70338", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00635", "scoring_system": "epss", "scoring_elements": "0.70384", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00635", "scoring_system": "epss", "scoring_elements": "0.70398", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00828", "scoring_system": "epss", "scoring_elements": "0.74463", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3592" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137776", "reference_id": "2137776", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T15:14:01Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137776" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2022-3592", "reference_id": "CVE-2022-3592", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T15:14:01Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2022-3592" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2022-3592.html", "reference_id": "CVE-2022-3592.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T15:14:01Z/" } ], "url": "https://www.samba.org/samba/security/CVE-2022-3592.html" }, { "reference_url": "https://security.gentoo.org/glsa/202309-06", "reference_id": "GLSA-202309-06", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T15:14:01Z/" } ], "url": "https://security.gentoo.org/glsa/202309-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/465428?format=api", "purl": "pkg:apk/alpine/samba@4.15.12-r0?arch=s390x&distroversion=v3.16&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/samba@4.15.12-r0%3Farch=s390x&distroversion=v3.16&reponame=main" } ], "aliases": [ "CVE-2022-3592" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7rcm-14da-ybdv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48493?format=api", "vulnerability_id": "VCID-f772-3dtd-wba8", "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32742.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32742.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32742", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50607", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00574", "scoring_system": "epss", "scoring_elements": "0.68782", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00574", "scoring_system": "epss", "scoring_elements": "0.6874", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00574", "scoring_system": "epss", "scoring_elements": "0.68711", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00574", "scoring_system": "epss", "scoring_elements": "0.68753", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00574", "scoring_system": "epss", "scoring_elements": "0.68764", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00574", "scoring_system": "epss", "scoring_elements": "0.68742", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00574", "scoring_system": "epss", "scoring_elements": "0.6879", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00574", "scoring_system": "epss", "scoring_elements": "0.68796", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00574", "scoring_system": "epss", "scoring_elements": "0.68802", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00574", "scoring_system": "epss", "scoring_elements": "0.68685", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00574", "scoring_system": "epss", "scoring_elements": "0.68662", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00574", "scoring_system": "epss", "scoring_elements": "0.68714", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00574", "scoring_system": "epss", "scoring_elements": "0.68732", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00574", "scoring_system": "epss", "scoring_elements": "0.68754", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449", "reference_id": "1016449", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108196", "reference_id": "2108196", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108196" }, { "reference_url": "https://security.archlinux.org/AVG-2782", "reference_id": "AVG-2782", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2782" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2022-32742.html", "reference_id": "CVE-2022-32742.html", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T19:44:06Z/" } ], "url": "https://www.samba.org/samba/security/CVE-2022-32742.html" }, { "reference_url": "https://security.gentoo.org/glsa/202309-06", "reference_id": "GLSA-202309-06", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T19:44:06Z/" } ], "url": "https://security.gentoo.org/glsa/202309-06" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html", "reference_id": "msg00015.html", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T19:44:06Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7056", "reference_id": "RHSA-2022:7056", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7056" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7111", "reference_id": "RHSA-2022:7111", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7111" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8317", "reference_id": "RHSA-2022:8317", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8317" }, { "reference_url": "https://usn.ubuntu.com/5542-1/", "reference_id": "USN-5542-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5542-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/465428?format=api", "purl": "pkg:apk/alpine/samba@4.15.12-r0?arch=s390x&distroversion=v3.16&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/samba@4.15.12-r0%3Farch=s390x&distroversion=v3.16&reponame=main" } ], "aliases": [ "CVE-2022-32742" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f772-3dtd-wba8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48489?format=api", "vulnerability_id": "VCID-hzy4-16j5-8qcf", "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2031.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2031.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2031", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00323", "scoring_system": "epss", "scoring_elements": "0.55424", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00323", "scoring_system": "epss", "scoring_elements": "0.55385", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00323", "scoring_system": "epss", "scoring_elements": "0.55363", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00323", "scoring_system": "epss", "scoring_elements": "0.55414", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00323", "scoring_system": "epss", "scoring_elements": "0.55403", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00323", "scoring_system": "epss", "scoring_elements": "0.55384", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00323", "scoring_system": "epss", "scoring_elements": "0.5542", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57524", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57544", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57475", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57525", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00422", "scoring_system": "epss", "scoring_elements": "0.62033", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2031" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449", "reference_id": "1016449", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094789", "reference_id": "2094789", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094789" }, { "reference_url": "https://security.archlinux.org/AVG-2782", "reference_id": "AVG-2782", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2782" }, { "reference_url": "https://security.gentoo.org/glsa/202309-06", "reference_id": "GLSA-202309-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202309-06" }, { "reference_url": "https://usn.ubuntu.com/5542-1/", "reference_id": "USN-5542-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5542-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/465428?format=api", "purl": "pkg:apk/alpine/samba@4.15.12-r0?arch=s390x&distroversion=v3.16&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/samba@4.15.12-r0%3Farch=s390x&distroversion=v3.16&reponame=main" } ], "aliases": [ "CVE-2022-2031" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hzy4-16j5-8qcf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48486?format=api", "vulnerability_id": "VCID-m44e-rw2w-vuhj", "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0336.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0336.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0336", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00382", "scoring_system": "epss", "scoring_elements": "0.59459", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00382", "scoring_system": "epss", "scoring_elements": "0.59534", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00382", "scoring_system": "epss", "scoring_elements": "0.59587", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00382", "scoring_system": "epss", "scoring_elements": "0.59573", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00382", "scoring_system": "epss", "scoring_elements": "0.59531", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00382", "scoring_system": "epss", "scoring_elements": "0.59556", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00382", "scoring_system": "epss", "scoring_elements": "0.59525", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00382", "scoring_system": "epss", "scoring_elements": "0.59576", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00382", "scoring_system": "epss", "scoring_elements": "0.59589", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00382", "scoring_system": "epss", "scoring_elements": "0.59607", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00382", "scoring_system": "epss", "scoring_elements": "0.59591", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00382", "scoring_system": "epss", "scoring_elements": "0.59571", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00382", "scoring_system": "epss", "scoring_elements": "0.59604", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00382", "scoring_system": "epss", "scoring_elements": "0.59611", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00382", "scoring_system": "epss", "scoring_elements": "0.59595", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00382", "scoring_system": "epss", "scoring_elements": "0.59567", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0336" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0336", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0336" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004694", "reference_id": "1004694", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004694" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046134", "reference_id": "2046134", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046134" }, { "reference_url": "https://security.archlinux.org/AVG-2648", "reference_id": "AVG-2648", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2648" }, { "reference_url": "https://security.gentoo.org/glsa/202309-06", "reference_id": "GLSA-202309-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202309-06" }, { "reference_url": "https://usn.ubuntu.com/5260-1/", "reference_id": "USN-5260-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5260-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/465428?format=api", "purl": "pkg:apk/alpine/samba@4.15.12-r0?arch=s390x&distroversion=v3.16&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/samba@4.15.12-r0%3Farch=s390x&distroversion=v3.16&reponame=main" } ], "aliases": [ "CVE-2022-0336" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m44e-rw2w-vuhj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48497?format=api", "vulnerability_id": "VCID-rgu3-rgej-aucp", "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32745.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32745.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32745", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62238", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62221", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62228", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62207", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62253", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.6226", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62244", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62185", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62153", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62203", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00461", "scoring_system": "epss", "scoring_elements": "0.64221", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00461", "scoring_system": "epss", "scoring_elements": "0.6419", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00461", "scoring_system": "epss", "scoring_elements": "0.64207", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00555", "scoring_system": "epss", "scoring_elements": "0.68055", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449", "reference_id": "1016449", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108211", "reference_id": "2108211", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108211" }, { "reference_url": "https://security.archlinux.org/AVG-2782", "reference_id": "AVG-2782", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2782" }, { "reference_url": "https://security.gentoo.org/glsa/202309-06", "reference_id": "GLSA-202309-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202309-06" }, { "reference_url": "https://usn.ubuntu.com/5542-1/", "reference_id": "USN-5542-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5542-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/465428?format=api", "purl": "pkg:apk/alpine/samba@4.15.12-r0?arch=s390x&distroversion=v3.16&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/samba@4.15.12-r0%3Farch=s390x&distroversion=v3.16&reponame=main" } ], "aliases": [ "CVE-2022-32745" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rgu3-rgej-aucp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48490?format=api", "vulnerability_id": "VCID-s2ne-rcp3-nbgz", "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3437.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3437.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3437", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.7265", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72529", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72545", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72522", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.7256", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72572", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72596", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72579", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72568", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.7261", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72621", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72612", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72654", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72663", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72659", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3437" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/02/08/1", "reference_id": "1", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/02/08/1" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187", "reference_id": "1024187", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137774", "reference_id": "2137774", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137774" }, { "reference_url": "https://security.archlinux.org/AVG-2828", "reference_id": "AVG-2828", "reference_type": "", "scores": [ { "value": "Unknown", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2828" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2022-3437", "reference_id": "CVE-2022-3437", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2022-3437" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2022-3437.html", "reference_id": "CVE-2022-3437.html", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/" } ], "url": "https://www.samba.org/samba/security/CVE-2022-3437.html" }, { "reference_url": "https://security.gentoo.org/glsa/202309-06", "reference_id": "GLSA-202309-06", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/" } ], "url": "https://security.gentoo.org/glsa/202309-06" }, { "reference_url": "https://security.gentoo.org/glsa/202310-06", "reference_id": "GLSA-202310-06", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/" } ], "url": "https://security.gentoo.org/glsa/202310-06" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html", "reference_id": "msg00015.html", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230216-0008/", "reference_id": "ntap-20230216-0008", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230216-0008/" }, { "reference_url": "https://usn.ubuntu.com/5800-1/", "reference_id": "USN-5800-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5800-1/" }, { "reference_url": "https://usn.ubuntu.com/5822-1/", "reference_id": "USN-5822-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5822-1/" }, { "reference_url": "https://usn.ubuntu.com/5936-1/", "reference_id": "USN-5936-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5936-1/" }, { "reference_url": "https://usn.ubuntu.com/7582-1/", "reference_id": "USN-7582-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7582-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/465428?format=api", "purl": "pkg:apk/alpine/samba@4.15.12-r0?arch=s390x&distroversion=v3.16&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/samba@4.15.12-r0%3Farch=s390x&distroversion=v3.16&reponame=main" } ], "aliases": [ "CVE-2022-3437" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s2ne-rcp3-nbgz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48498?format=api", "vulnerability_id": "VCID-t3zy-v34p-7uen", "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32746.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32746.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32746", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00302", "scoring_system": "epss", "scoring_elements": "0.53475", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56678", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56694", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56703", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56657", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56688", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56687", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56659", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.5666", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56638", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.5669", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00368", "scoring_system": "epss", "scoring_elements": "0.58688", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00368", "scoring_system": "epss", "scoring_elements": "0.58703", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00368", "scoring_system": "epss", "scoring_elements": "0.58687", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00368", "scoring_system": "epss", "scoring_elements": "0.58655", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449", "reference_id": "1016449", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108215", "reference_id": "2108215", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108215" }, { "reference_url": "https://security.archlinux.org/AVG-2782", "reference_id": "AVG-2782", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2782" }, { "reference_url": "https://security.gentoo.org/glsa/202309-06", "reference_id": "GLSA-202309-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202309-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7730", "reference_id": "RHSA-2022:7730", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7730" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8318", "reference_id": "RHSA-2022:8318", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8318" }, { "reference_url": "https://usn.ubuntu.com/5542-1/", "reference_id": "USN-5542-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5542-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/465428?format=api", "purl": "pkg:apk/alpine/samba@4.15.12-r0?arch=s390x&distroversion=v3.16&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/samba@4.15.12-r0%3Farch=s390x&distroversion=v3.16&reponame=main" } ], "aliases": [ "CVE-2022-32746" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t3zy-v34p-7uen" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48496?format=api", "vulnerability_id": "VCID-xwke-mduk-kyga", "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32744.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32744.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32744", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00424", "scoring_system": "epss", "scoring_elements": "0.62128", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.6482", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64814", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64831", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64792", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.6483", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64841", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64828", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64787", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.6475", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64799", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00516", "scoring_system": "epss", "scoring_elements": "0.66704", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00516", "scoring_system": "epss", "scoring_elements": "0.66718", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00516", "scoring_system": "epss", "scoring_elements": "0.66717", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00516", "scoring_system": "epss", "scoring_elements": "0.66691", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32744" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449", "reference_id": "1016449", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108205", "reference_id": "2108205", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108205" }, { "reference_url": "https://security.archlinux.org/AVG-2782", "reference_id": "AVG-2782", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2782" }, { "reference_url": "https://security.gentoo.org/glsa/202309-06", "reference_id": "GLSA-202309-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202309-06" }, { "reference_url": "https://usn.ubuntu.com/5542-1/", "reference_id": "USN-5542-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5542-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/465428?format=api", "purl": "pkg:apk/alpine/samba@4.15.12-r0?arch=s390x&distroversion=v3.16&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/samba@4.15.12-r0%3Farch=s390x&distroversion=v3.16&reponame=main" } ], "aliases": [ "CVE-2022-32744" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xwke-mduk-kyga" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/samba@4.15.12-r0%3Farch=s390x&distroversion=v3.16&reponame=main" }