Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/77322?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/77322?format=api", "purl": "pkg:ebuild/net-fs/samba@4.11.6", "type": "ebuild", "namespace": "net-fs", "name": "samba", "version": "4.11.6", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "4.11.11", "latest_non_vulnerable_version": "4.18.9", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47961?format=api", "vulnerability_id": "VCID-21hz-xvek-73cd", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16860.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16860.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16860", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83706", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83719", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83734", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83736", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.8376", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83767", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83783", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83777", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83772", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83806", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83807", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83808", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83833", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83841", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83846", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83868", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83889", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83905", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83921", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83955", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16860" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16860", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16860" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705877", "reference_id": "1705877", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705877" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928966", "reference_id": "928966", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928966" }, { "reference_url": "https://security.gentoo.org/glsa/202003-52", "reference_id": "GLSA-202003-52", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-52" }, { "reference_url": "https://usn.ubuntu.com/3976-1/", "reference_id": "USN-3976-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3976-1/" }, { "reference_url": "https://usn.ubuntu.com/3976-2/", "reference_id": "USN-3976-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3976-2/" }, { "reference_url": "https://usn.ubuntu.com/5675-1/", "reference_id": "USN-5675-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5675-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77322?format=api", "purl": "pkg:ebuild/net-fs/samba@4.11.6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.11.6" } ], "aliases": [ "CVE-2018-16860" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-21hz-xvek-73cd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47963?format=api", "vulnerability_id": "VCID-2gkd-vubu-j7fd", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14861.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14861.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14861", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04997", "scoring_system": "epss", "scoring_elements": "0.89794", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.04997", "scoring_system": "epss", "scoring_elements": "0.89663", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04997", "scoring_system": "epss", "scoring_elements": "0.89666", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04997", "scoring_system": "epss", "scoring_elements": "0.8968", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04997", "scoring_system": "epss", "scoring_elements": "0.89683", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04997", "scoring_system": "epss", "scoring_elements": "0.897", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04997", "scoring_system": "epss", "scoring_elements": "0.89706", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04997", "scoring_system": "epss", "scoring_elements": "0.89713", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04997", "scoring_system": "epss", "scoring_elements": "0.89712", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04997", "scoring_system": "epss", "scoring_elements": "0.89705", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04997", "scoring_system": "epss", "scoring_elements": "0.89721", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04997", "scoring_system": "epss", "scoring_elements": "0.89722", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04997", "scoring_system": "epss", "scoring_elements": "0.89717", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04997", "scoring_system": "epss", "scoring_elements": "0.89732", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.04997", "scoring_system": "epss", "scoring_elements": "0.89734", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.04997", "scoring_system": "epss", "scoring_elements": "0.89733", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.04997", "scoring_system": "epss", "scoring_elements": "0.89744", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.04997", "scoring_system": "epss", "scoring_elements": "0.89759", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.04997", "scoring_system": "epss", "scoring_elements": "0.89771", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.04997", "scoring_system": "epss", "scoring_elements": "0.89766", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.04997", "scoring_system": "epss", "scoring_elements": "0.89776", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14861" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14861", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14861" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778586", "reference_id": "1778586", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778586" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/06/24/3", "reference_id": "3", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/06/24/3" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2019-14861.html", "reference_id": "CVE-2019-14861.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/" } ], "url": "https://www.samba.org/samba/security/CVE-2019-14861.html" }, { "reference_url": "https://security.gentoo.org/glsa/202003-52", "reference_id": "GLSA-202003-52", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/" } ], "url": "https://security.gentoo.org/glsa/202003-52" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00038.html", "reference_id": "msg00038.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00038.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20191210-0002/", "reference_id": "ntap-20191210-0002", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20191210-0002/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PJH3ROOFYMOATD2UEPC47P5RPBDTY77E/", "reference_id": "PJH3ROOFYMOATD2UEPC47P5RPBDTY77E", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PJH3ROOFYMOATD2UEPC47P5RPBDTY77E/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14861", "reference_id": "show_bug.cgi?id=CVE-2019-14861", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14861" }, { "reference_url": "https://www.synology.com/security/advisory/Synology_SA_19_40", "reference_id": "Synology_SA_19_40", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/" } ], "url": "https://www.synology.com/security/advisory/Synology_SA_19_40" }, { "reference_url": "https://usn.ubuntu.com/4217-1/", "reference_id": "USN-4217-1", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/" } ], "url": "https://usn.ubuntu.com/4217-1/" }, { "reference_url": "https://usn.ubuntu.com/4217-2/", "reference_id": "USN-4217-2", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/" } ], "url": "https://usn.ubuntu.com/4217-2/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNKA4YIPV7AZR7KK3GW6L3HKGHSGJZFE/", "reference_id": "WNKA4YIPV7AZR7KK3GW6L3HKGHSGJZFE", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNKA4YIPV7AZR7KK3GW6L3HKGHSGJZFE/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77322?format=api", "purl": "pkg:ebuild/net-fs/samba@4.11.6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.11.6" } ], "aliases": [ "CVE-2019-14861" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2gkd-vubu-j7fd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47954?format=api", "vulnerability_id": "VCID-2ks6-vhre-6ke2", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1140.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1140.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1140", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.14503", "scoring_system": "epss", "scoring_elements": "0.94413", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.14503", "scoring_system": "epss", "scoring_elements": "0.9442", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.14503", "scoring_system": "epss", "scoring_elements": "0.94431", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.14503", "scoring_system": "epss", "scoring_elements": "0.94433", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.14503", "scoring_system": "epss", "scoring_elements": "0.94443", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.14503", "scoring_system": "epss", "scoring_elements": "0.94446", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.14503", "scoring_system": "epss", "scoring_elements": "0.94449", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.14503", "scoring_system": "epss", "scoring_elements": "0.94451", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.14503", "scoring_system": "epss", "scoring_elements": "0.94465", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.14503", "scoring_system": "epss", "scoring_elements": "0.9447", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.14503", "scoring_system": "epss", "scoring_elements": "0.94473", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.14503", "scoring_system": "epss", "scoring_elements": "0.94474", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.14503", "scoring_system": "epss", "scoring_elements": "0.94472", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.14503", "scoring_system": "epss", "scoring_elements": "0.94478", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.14503", "scoring_system": "epss", "scoring_elements": "0.94485", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.14503", "scoring_system": "epss", "scoring_elements": "0.94496", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.14503", "scoring_system": "epss", "scoring_elements": "0.945", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.14503", "scoring_system": "epss", "scoring_elements": "0.94507", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.14503", "scoring_system": "epss", "scoring_elements": "0.94521", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1140" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1140", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1140" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1580230", "reference_id": "1580230", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1580230" }, { "reference_url": "https://security.gentoo.org/glsa/202003-52", "reference_id": "GLSA-202003-52", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-52" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77322?format=api", "purl": "pkg:ebuild/net-fs/samba@4.11.6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.11.6" } ], "aliases": [ "CVE-2018-1140" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2ks6-vhre-6ke2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47966?format=api", "vulnerability_id": "VCID-55zj-6b4s-8ker", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14902.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14902.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14902", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03503", "scoring_system": "epss", "scoring_elements": "0.87558", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03503", "scoring_system": "epss", "scoring_elements": "0.87567", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03503", "scoring_system": "epss", "scoring_elements": "0.87581", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03503", "scoring_system": "epss", "scoring_elements": "0.87583", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03503", "scoring_system": "epss", "scoring_elements": "0.87602", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03503", "scoring_system": "epss", "scoring_elements": "0.87609", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03503", "scoring_system": "epss", "scoring_elements": "0.8762", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03503", "scoring_system": "epss", "scoring_elements": "0.87615", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03503", "scoring_system": "epss", "scoring_elements": "0.87612", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03503", "scoring_system": "epss", "scoring_elements": "0.87627", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03503", "scoring_system": "epss", "scoring_elements": "0.87628", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03503", "scoring_system": "epss", "scoring_elements": "0.87625", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03503", "scoring_system": "epss", "scoring_elements": "0.87643", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03503", "scoring_system": "epss", "scoring_elements": "0.8765", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.03503", "scoring_system": "epss", "scoring_elements": "0.87648", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.03503", "scoring_system": "epss", "scoring_elements": "0.87663", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.03503", "scoring_system": "epss", "scoring_elements": "0.87678", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.03503", "scoring_system": "epss", "scoring_elements": "0.87696", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.03503", "scoring_system": "epss", "scoring_elements": "0.87693", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.03503", "scoring_system": "epss", "scoring_elements": "0.87706", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.03503", "scoring_system": "epss", "scoring_elements": "0.87738", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14902" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14902", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14902" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1791201", "reference_id": "1791201", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1791201" }, { "reference_url": "https://security.gentoo.org/glsa/202003-52", "reference_id": "GLSA-202003-52", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-52" }, { "reference_url": "https://usn.ubuntu.com/4244-1/", "reference_id": "USN-4244-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4244-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77322?format=api", "purl": "pkg:ebuild/net-fs/samba@4.11.6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.11.6" } ], "aliases": [ "CVE-2019-14902" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "4.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-55zj-6b4s-8ker" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47955?format=api", "vulnerability_id": "VCID-cjqf-muwp-3qbq", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14629.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14629.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14629", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.09242", "scoring_system": "epss", "scoring_elements": "0.92692", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.09242", "scoring_system": "epss", "scoring_elements": "0.92806", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.09242", "scoring_system": "epss", "scoring_elements": "0.92776", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.09242", "scoring_system": "epss", "scoring_elements": "0.92782", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.09242", "scoring_system": "epss", "scoring_elements": "0.92699", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.09242", "scoring_system": "epss", "scoring_elements": "0.92705", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.09242", "scoring_system": "epss", "scoring_elements": "0.92704", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.09242", "scoring_system": "epss", "scoring_elements": "0.92714", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.09242", "scoring_system": "epss", "scoring_elements": "0.92718", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.09242", "scoring_system": "epss", "scoring_elements": "0.92724", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.09242", "scoring_system": "epss", "scoring_elements": "0.92723", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.09242", "scoring_system": "epss", "scoring_elements": "0.92734", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.09242", "scoring_system": "epss", "scoring_elements": "0.92738", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.09242", "scoring_system": "epss", "scoring_elements": "0.92742", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.09242", "scoring_system": "epss", "scoring_elements": "0.92746", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.09242", "scoring_system": "epss", "scoring_elements": "0.92759", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.09242", "scoring_system": "epss", "scoring_elements": "0.92771", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14629" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14629", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14629" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16841", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16851" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1625449", "reference_id": "1625449", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1625449" }, { "reference_url": "https://security.archlinux.org/ASA-201811-22", "reference_id": "ASA-201811-22", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201811-22" }, { "reference_url": "https://security.archlinux.org/AVG-823", "reference_id": "AVG-823", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-823" }, { "reference_url": "https://security.gentoo.org/glsa/202003-52", "reference_id": "GLSA-202003-52", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-52" }, { "reference_url": "https://usn.ubuntu.com/3827-1/", "reference_id": "USN-3827-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3827-1/" }, { "reference_url": "https://usn.ubuntu.com/3827-2/", "reference_id": "USN-3827-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3827-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77322?format=api", "purl": "pkg:ebuild/net-fs/samba@4.11.6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.11.6" } ], "aliases": [ "CVE-2018-14629" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cjqf-muwp-3qbq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47967?format=api", "vulnerability_id": "VCID-crh2-zv3e-pfaa", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14907.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14907.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14907", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.10242", "scoring_system": "epss", "scoring_elements": "0.93119", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.10242", "scoring_system": "epss", "scoring_elements": "0.93129", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.10242", "scoring_system": "epss", "scoring_elements": "0.93132", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.10242", "scoring_system": "epss", "scoring_elements": "0.93131", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.10242", "scoring_system": "epss", "scoring_elements": "0.9314", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.10242", "scoring_system": "epss", "scoring_elements": "0.93144", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.10242", "scoring_system": "epss", "scoring_elements": "0.9315", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.10242", "scoring_system": "epss", "scoring_elements": "0.93147", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.10242", "scoring_system": "epss", "scoring_elements": "0.93148", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.10242", "scoring_system": "epss", "scoring_elements": "0.93165", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.10242", "scoring_system": "epss", "scoring_elements": "0.93169", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.10242", "scoring_system": "epss", "scoring_elements": "0.93177", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.10242", "scoring_system": "epss", "scoring_elements": "0.93182", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.10242", "scoring_system": "epss", "scoring_elements": "0.93181", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.10242", "scoring_system": "epss", "scoring_elements": "0.93178", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.10242", "scoring_system": "epss", "scoring_elements": "0.93185", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.10242", "scoring_system": "epss", "scoring_elements": "0.93199", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.10242", "scoring_system": "epss", "scoring_elements": "0.93209", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.10242", "scoring_system": "epss", "scoring_elements": "0.93211", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.10242", "scoring_system": "epss", "scoring_elements": "0.93218", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.10242", "scoring_system": "epss", "scoring_elements": "0.93234", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14907" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14907", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14907" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1791207", "reference_id": "1791207", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1791207" }, { "reference_url": "https://security.gentoo.org/glsa/202003-52", "reference_id": "GLSA-202003-52", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-52" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0943", "reference_id": "RHSA-2020:0943", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0943" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1878", "reference_id": "RHSA-2020:1878", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1878" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3981", "reference_id": "RHSA-2020:3981", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3981" }, { "reference_url": "https://usn.ubuntu.com/4244-1/", "reference_id": "USN-4244-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4244-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77322?format=api", "purl": "pkg:ebuild/net-fs/samba@4.11.6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.11.6" } ], "aliases": [ "CVE-2019-14907" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-crh2-zv3e-pfaa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47964?format=api", "vulnerability_id": "VCID-frnd-3wwy-93ek", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14870.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14870.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14870", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89278", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89283", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89297", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.893", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89317", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89321", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.8933", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89328", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89324", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89338", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89337", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89332", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.8935", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89354", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89357", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89367", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89385", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89398", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89396", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89407", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89428", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14870" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14870", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14870" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778589", "reference_id": "1778589", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778589" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946786", "reference_id": "946786", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946786" }, { "reference_url": "https://security.gentoo.org/glsa/202003-52", "reference_id": "GLSA-202003-52", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-52" }, { "reference_url": "https://security.gentoo.org/glsa/202310-06", "reference_id": "GLSA-202310-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202310-06" }, { "reference_url": "https://usn.ubuntu.com/4217-1/", "reference_id": "USN-4217-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4217-1/" }, { "reference_url": "https://usn.ubuntu.com/4217-2/", "reference_id": "USN-4217-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4217-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77322?format=api", "purl": "pkg:ebuild/net-fs/samba@4.11.6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.11.6" } ], "aliases": [ "CVE-2019-14870" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "4.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-frnd-3wwy-93ek" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47957?format=api", "vulnerability_id": "VCID-h2pu-vhv4-yfhx", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16851.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16851.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16851", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.92672", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.92785", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.92755", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.92761", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.92679", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.92685", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.92684", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.92694", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.92699", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.92705", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.92704", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.92703", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.92715", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.9272", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.92723", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.92724", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.92718", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.92726", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.9274", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.09195", "scoring_system": "epss", "scoring_elements": "0.92751", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16851" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14629", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14629" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16841", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16851" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646377", "reference_id": "1646377", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646377" }, { "reference_url": "https://security.archlinux.org/ASA-201811-22", "reference_id": "ASA-201811-22", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201811-22" }, { "reference_url": "https://security.archlinux.org/AVG-823", "reference_id": "AVG-823", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-823" }, { "reference_url": "https://security.gentoo.org/glsa/202003-52", "reference_id": "GLSA-202003-52", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-52" }, { "reference_url": "https://usn.ubuntu.com/3827-1/", "reference_id": "USN-3827-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3827-1/" }, { "reference_url": "https://usn.ubuntu.com/3827-2/", "reference_id": "USN-3827-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3827-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77322?format=api", "purl": "pkg:ebuild/net-fs/samba@4.11.6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.11.6" } ], "aliases": [ "CVE-2018-16851" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h2pu-vhv4-yfhx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47960?format=api", "vulnerability_id": "VCID-he7x-3928-fffk", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16857.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16857.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16857", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0224", "scoring_system": "epss", "scoring_elements": "0.84483", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0224", "scoring_system": "epss", "scoring_elements": "0.84721", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.0224", "scoring_system": "epss", "scoring_elements": "0.84673", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0224", "scoring_system": "epss", "scoring_elements": "0.8469", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0224", "scoring_system": "epss", "scoring_elements": "0.84498", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0224", "scoring_system": "epss", "scoring_elements": "0.8452", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0224", "scoring_system": "epss", "scoring_elements": "0.84522", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0224", "scoring_system": "epss", "scoring_elements": "0.84544", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0224", "scoring_system": "epss", "scoring_elements": "0.84549", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0224", "scoring_system": "epss", "scoring_elements": "0.84568", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0224", "scoring_system": "epss", "scoring_elements": "0.84563", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0224", "scoring_system": "epss", "scoring_elements": "0.84559", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0224", "scoring_system": "epss", "scoring_elements": "0.84579", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0224", "scoring_system": "epss", "scoring_elements": "0.8458", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0224", "scoring_system": "epss", "scoring_elements": "0.84581", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0224", "scoring_system": "epss", "scoring_elements": "0.84607", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0224", "scoring_system": "epss", "scoring_elements": "0.84615", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0224", "scoring_system": "epss", "scoring_elements": "0.84617", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0224", "scoring_system": "epss", "scoring_elements": "0.84633", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0224", "scoring_system": "epss", "scoring_elements": "0.84659", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0224", "scoring_system": "epss", "scoring_elements": "0.84676", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16857" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16857", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16857" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1649278", "reference_id": "1649278", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1649278" }, { "reference_url": "https://security.archlinux.org/ASA-201811-22", "reference_id": "ASA-201811-22", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201811-22" }, { "reference_url": "https://security.archlinux.org/AVG-823", "reference_id": "AVG-823", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-823" }, { "reference_url": "https://security.gentoo.org/glsa/202003-52", "reference_id": "GLSA-202003-52", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-52" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77322?format=api", "purl": "pkg:ebuild/net-fs/samba@4.11.6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.11.6" } ], "aliases": [ "CVE-2018-16857" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-he7x-3928-fffk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47950?format=api", "vulnerability_id": "VCID-mbcb-7zmf-2yah", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10858.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10858.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10858", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90591", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90595", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90605", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90613", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90624", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90629", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90639", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90634", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90653", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.9065", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90648", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90663", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90665", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90661", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90674", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90693", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90707", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90705", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90714", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0594", "scoring_system": "epss", "scoring_elements": "0.90727", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10858" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10858", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10858" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10919", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10919" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1612805", "reference_id": "1612805", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1612805" }, { "reference_url": "https://security.gentoo.org/glsa/202003-52", "reference_id": "GLSA-202003-52", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-52" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2612", "reference_id": "RHSA-2018:2612", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2612" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2613", "reference_id": "RHSA-2018:2613", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2613" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3056", "reference_id": "RHSA-2018:3056", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3056" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3470", "reference_id": "RHSA-2018:3470", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3470" }, { "reference_url": "https://usn.ubuntu.com/3738-1/", "reference_id": "USN-3738-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3738-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77322?format=api", "purl": "pkg:ebuild/net-fs/samba@4.11.6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.11.6" } ], "aliases": [ "CVE-2018-10858" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mbcb-7zmf-2yah" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47953?format=api", "vulnerability_id": "VCID-qx51-4w39-hyd3", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1139.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1139.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1139", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0162", "scoring_system": "epss", "scoring_elements": "0.81759", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0162", "scoring_system": "epss", "scoring_elements": "0.81769", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0162", "scoring_system": "epss", "scoring_elements": "0.81793", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0162", "scoring_system": "epss", "scoring_elements": "0.8179", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0162", "scoring_system": "epss", "scoring_elements": "0.81817", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0162", "scoring_system": "epss", "scoring_elements": "0.81823", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0162", "scoring_system": "epss", "scoring_elements": "0.81842", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0162", "scoring_system": "epss", "scoring_elements": "0.8183", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0162", "scoring_system": "epss", "scoring_elements": "0.81824", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0162", "scoring_system": "epss", "scoring_elements": "0.8186", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0162", "scoring_system": "epss", "scoring_elements": "0.81861", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0162", "scoring_system": "epss", "scoring_elements": "0.81864", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0162", "scoring_system": "epss", "scoring_elements": "0.81888", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0162", "scoring_system": "epss", "scoring_elements": "0.81898", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0162", "scoring_system": "epss", "scoring_elements": "0.81903", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0162", "scoring_system": "epss", "scoring_elements": "0.81921", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0162", "scoring_system": "epss", "scoring_elements": "0.81941", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0162", "scoring_system": "epss", "scoring_elements": "0.81966", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0162", "scoring_system": "epss", "scoring_elements": "0.81963", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0162", "scoring_system": "epss", "scoring_elements": "0.8198", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0162", "scoring_system": "epss", "scoring_elements": "0.82021", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1139" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1139", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1139" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1589651", "reference_id": "1589651", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1589651" }, { "reference_url": "https://security.gentoo.org/glsa/202003-52", "reference_id": "GLSA-202003-52", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-52" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2612", "reference_id": "RHSA-2018:2612", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2612" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2613", "reference_id": "RHSA-2018:2613", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2613" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3056", "reference_id": "RHSA-2018:3056", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3056" }, { "reference_url": "https://usn.ubuntu.com/3738-1/", "reference_id": "USN-3738-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3738-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77322?format=api", "purl": "pkg:ebuild/net-fs/samba@4.11.6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.11.6" } ], "aliases": [ "CVE-2018-1139" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "4.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qx51-4w39-hyd3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47952?format=api", "vulnerability_id": "VCID-sd1b-cmgu-23h3", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10919.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10919.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10919", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01182", "scoring_system": "epss", "scoring_elements": "0.7876", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01182", "scoring_system": "epss", "scoring_elements": "0.78786", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01182", "scoring_system": "epss", "scoring_elements": "0.78769", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.80233", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.80421", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.80206", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.80195", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.80223", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.80363", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.8038", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.80261", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.80262", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.80265", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.80291", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.80298", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.80314", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.80329", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.80352", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.80369", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01785", "scoring_system": "epss", "scoring_elements": "0.8268", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01785", "scoring_system": "epss", "scoring_elements": "0.82664", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10919" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10858", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10858" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10919", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10919" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610645", "reference_id": "1610645", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610645" }, { "reference_url": "https://security.gentoo.org/glsa/202003-52", "reference_id": "GLSA-202003-52", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-52" }, { "reference_url": "https://usn.ubuntu.com/3738-1/", "reference_id": "USN-3738-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3738-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77322?format=api", "purl": "pkg:ebuild/net-fs/samba@4.11.6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.11.6" } ], "aliases": [ "CVE-2018-10919" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sd1b-cmgu-23h3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47958?format=api", "vulnerability_id": "VCID-tskp-1ra2-wyez", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16852.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16852.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16852", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02897", "scoring_system": "epss", "scoring_elements": "0.86261", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02897", "scoring_system": "epss", "scoring_elements": "0.86472", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.02897", "scoring_system": "epss", "scoring_elements": "0.86421", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.02897", "scoring_system": "epss", "scoring_elements": "0.86435", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.02897", "scoring_system": "epss", "scoring_elements": "0.86271", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02897", "scoring_system": "epss", "scoring_elements": "0.86289", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02897", "scoring_system": "epss", "scoring_elements": "0.86307", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02897", "scoring_system": "epss", "scoring_elements": "0.86317", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02897", "scoring_system": "epss", "scoring_elements": "0.86332", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02897", "scoring_system": "epss", "scoring_elements": "0.8633", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02897", "scoring_system": "epss", "scoring_elements": "0.86325", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02897", "scoring_system": "epss", "scoring_elements": "0.86341", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02897", "scoring_system": "epss", "scoring_elements": "0.86345", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02897", "scoring_system": "epss", "scoring_elements": "0.86339", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02897", "scoring_system": "epss", "scoring_elements": "0.8636", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02897", "scoring_system": "epss", "scoring_elements": "0.86369", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02897", "scoring_system": "epss", "scoring_elements": "0.86365", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02897", "scoring_system": "epss", "scoring_elements": "0.86385", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.02897", "scoring_system": "epss", "scoring_elements": "0.86405", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.02897", "scoring_system": "epss", "scoring_elements": "0.86425", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16852" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16852", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16852" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646386", "reference_id": "1646386", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646386" }, { "reference_url": "https://security.archlinux.org/ASA-201811-22", "reference_id": "ASA-201811-22", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201811-22" }, { "reference_url": "https://security.archlinux.org/AVG-823", "reference_id": "AVG-823", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-823" }, { "reference_url": "https://security.gentoo.org/glsa/202003-52", "reference_id": "GLSA-202003-52", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-52" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77322?format=api", "purl": "pkg:ebuild/net-fs/samba@4.11.6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.11.6" } ], "aliases": [ "CVE-2018-16852" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tskp-1ra2-wyez" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47959?format=api", "vulnerability_id": "VCID-v39j-84q1-j3ef", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16853.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16853.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16853", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04908", "scoring_system": "epss", "scoring_elements": "0.89565", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04908", "scoring_system": "epss", "scoring_elements": "0.89569", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04908", "scoring_system": "epss", "scoring_elements": "0.89582", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04908", "scoring_system": "epss", "scoring_elements": "0.89583", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04908", "scoring_system": "epss", "scoring_elements": "0.89599", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04908", "scoring_system": "epss", "scoring_elements": "0.89604", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04908", "scoring_system": "epss", "scoring_elements": "0.89611", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04908", "scoring_system": "epss", "scoring_elements": "0.8961", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04908", "scoring_system": "epss", "scoring_elements": "0.89618", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04908", "scoring_system": "epss", "scoring_elements": "0.89619", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04908", "scoring_system": "epss", "scoring_elements": "0.89615", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04908", "scoring_system": "epss", "scoring_elements": "0.8963", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.04908", "scoring_system": "epss", "scoring_elements": "0.89634", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.04908", "scoring_system": "epss", "scoring_elements": "0.89643", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.04908", "scoring_system": "epss", "scoring_elements": "0.89661", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.04908", "scoring_system": "epss", "scoring_elements": "0.89673", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.04908", "scoring_system": "epss", "scoring_elements": "0.8967", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.04908", "scoring_system": "epss", "scoring_elements": "0.89679", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.04908", "scoring_system": "epss", "scoring_elements": "0.89697", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16853" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16853", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16853" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1647246", "reference_id": "1647246", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1647246" }, { "reference_url": "https://security.archlinux.org/ASA-201811-22", "reference_id": "ASA-201811-22", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201811-22" }, { "reference_url": "https://security.archlinux.org/AVG-823", "reference_id": "AVG-823", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-823" }, { "reference_url": "https://security.gentoo.org/glsa/202003-52", "reference_id": "GLSA-202003-52", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-52" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77322?format=api", "purl": "pkg:ebuild/net-fs/samba@4.11.6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.11.6" } ], "aliases": [ "CVE-2018-16853" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v39j-84q1-j3ef" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47956?format=api", "vulnerability_id": "VCID-wpvs-jabz-2ye3", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16841.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16841.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16841", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.91489", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.91608", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.9159", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.916", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.91496", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.91503", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.9151", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.91524", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.9153", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.91535", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.91536", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.91534", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.91557", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.91552", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.9156", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.91558", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.91569", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.91582", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.07105", "scoring_system": "epss", "scoring_elements": "0.91592", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14629", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14629" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16841", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16851" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1642545", "reference_id": "1642545", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1642545" }, { "reference_url": "https://security.archlinux.org/ASA-201811-22", "reference_id": "ASA-201811-22", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201811-22" }, { "reference_url": "https://security.archlinux.org/AVG-823", "reference_id": "AVG-823", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-823" }, { "reference_url": "https://security.gentoo.org/glsa/202003-52", "reference_id": "GLSA-202003-52", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-52" }, { "reference_url": "https://usn.ubuntu.com/3827-1/", "reference_id": "USN-3827-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3827-1/" }, { "reference_url": "https://usn.ubuntu.com/3827-2/", "reference_id": "USN-3827-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3827-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77322?format=api", "purl": "pkg:ebuild/net-fs/samba@4.11.6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.11.6" } ], "aliases": [ "CVE-2018-16841" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wpvs-jabz-2ye3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47968?format=api", "vulnerability_id": "VCID-xyfs-p969-syfp", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19344.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19344.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19344", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02193", "scoring_system": "epss", "scoring_elements": "0.84569", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.02193", "scoring_system": "epss", "scoring_elements": "0.8446", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02193", "scoring_system": "epss", "scoring_elements": "0.84479", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.02193", "scoring_system": "epss", "scoring_elements": "0.84505", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.02193", "scoring_system": "epss", "scoring_elements": "0.84521", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.02193", "scoring_system": "epss", "scoring_elements": "0.8452", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.02193", "scoring_system": "epss", "scoring_elements": "0.84537", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.02308", "scoring_system": "epss", "scoring_elements": "0.84749", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02308", "scoring_system": "epss", "scoring_elements": "0.84763", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02308", "scoring_system": "epss", "scoring_elements": "0.84757", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02308", "scoring_system": "epss", "scoring_elements": "0.84779", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02308", "scoring_system": "epss", "scoring_elements": "0.8478", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02308", "scoring_system": "epss", "scoring_elements": "0.84778", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02308", "scoring_system": "epss", "scoring_elements": "0.84805", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02308", "scoring_system": "epss", "scoring_elements": "0.84815", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02308", "scoring_system": "epss", "scoring_elements": "0.84683", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02308", "scoring_system": "epss", "scoring_elements": "0.84767", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02308", "scoring_system": "epss", "scoring_elements": "0.84698", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02308", "scoring_system": "epss", "scoring_elements": "0.84719", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02308", "scoring_system": "epss", "scoring_elements": "0.8472", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02308", "scoring_system": "epss", "scoring_elements": "0.84742", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19344" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19344", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19344" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1791204", "reference_id": "1791204", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1791204" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=950499", "reference_id": "950499", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=950499" }, { "reference_url": "https://security.gentoo.org/glsa/202003-52", "reference_id": "GLSA-202003-52", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-52" }, { "reference_url": "https://usn.ubuntu.com/4244-1/", "reference_id": "USN-4244-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4244-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77322?format=api", "purl": "pkg:ebuild/net-fs/samba@4.11.6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.11.6" } ], "aliases": [ "CVE-2019-19344" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xyfs-p969-syfp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47962?format=api", "vulnerability_id": "VCID-ycau-9h17-quf3", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could lead to remote code execution.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00045.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00045.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10197.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10197.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10197", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0479", "scoring_system": "epss", "scoring_elements": "0.89441", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0479", "scoring_system": "epss", "scoring_elements": "0.89575", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.0479", "scoring_system": "epss", "scoring_elements": "0.89536", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0479", "scoring_system": "epss", "scoring_elements": "0.8955", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0479", "scoring_system": "epss", "scoring_elements": "0.89545", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0479", "scoring_system": "epss", "scoring_elements": "0.89556", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0479", "scoring_system": "epss", "scoring_elements": "0.89445", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0479", "scoring_system": "epss", "scoring_elements": "0.89455", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0479", "scoring_system": "epss", "scoring_elements": "0.89457", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0479", "scoring_system": "epss", "scoring_elements": "0.89473", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0479", "scoring_system": "epss", "scoring_elements": "0.89477", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0479", "scoring_system": "epss", "scoring_elements": "0.89486", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0479", "scoring_system": "epss", "scoring_elements": "0.89484", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0479", "scoring_system": "epss", "scoring_elements": "0.89479", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0479", "scoring_system": "epss", "scoring_elements": "0.89493", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0479", "scoring_system": "epss", "scoring_elements": "0.89491", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0479", "scoring_system": "epss", "scoring_elements": "0.89505", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0479", "scoring_system": "epss", "scoring_elements": "0.89509", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0479", "scoring_system": "epss", "scoring_elements": "0.8951", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0479", "scoring_system": "epss", "scoring_elements": "0.89518", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10197" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10197", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10197" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10197", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10197" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/56ZUXHGDHPM7S6RVAKULZT5EATS37OKA/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/56ZUXHGDHPM7S6RVAKULZT5EATS37OKA/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7NYIUZOCIDXWXGWMZ7O5Z7OJ6IX7EAB/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7NYIUZOCIDXWXGWMZ7O5Z7OJ6IX7EAB/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z6EEKFT24DQI4DMZMSQTLMNZWG4RMZ57/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z6EEKFT24DQI4DMZMSQTLMNZWG4RMZ57/" }, { "reference_url": "https://seclists.org/bugtraq/2019/Sep/4", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2019/Sep/4" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190903-0001/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20190903-0001/" }, { "reference_url": "https://support.f5.com/csp/article/K69511801", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.f5.com/csp/article/K69511801" }, { "reference_url": "https://support.f5.com/csp/article/K69511801?utm_source=f5support&%3Butm_medium=RSS", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.f5.com/csp/article/K69511801?utm_source=f5support&%3Butm_medium=RSS" }, { "reference_url": "https://www.debian.org/security/2019/dsa-4513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2019/dsa-4513" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2019-10197.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.samba.org/samba/security/CVE-2019-10197.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1746225", "reference_id": "1746225", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1746225" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.10.0:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.10.0:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.10.0:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.10.0:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.10.0:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.10.0:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.10.0:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.10.0:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.10.0:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.10.0:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.10.0:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.10.0:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.11.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.11.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.11.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.11.0:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.11.0:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.11.0:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.11.0:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.11.0:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.11.0:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.11.0:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.11.0:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.11.0:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.9.0:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.9.0:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.9.0:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.9.0:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.9.0:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.9.0:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.9.0:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.9.0:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.9.0:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.9.0:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.9.0:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.9.0:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.9.0:rc5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.9.0:rc5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.9.0:rc5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10197", "reference_id": "CVE-2019-10197", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:N" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" }, { "value": "9.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10197" }, { "reference_url": "https://security.gentoo.org/glsa/202003-52", "reference_id": "GLSA-202003-52", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-52" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3253", "reference_id": "RHSA-2019:3253", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3253" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:4023", "reference_id": "RHSA-2019:4023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:4023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1084", "reference_id": "RHSA-2020:1084", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1084" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1878", "reference_id": "RHSA-2020:1878", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1878" }, { "reference_url": "https://usn.ubuntu.com/4121-1/", "reference_id": "USN-4121-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4121-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77322?format=api", "purl": "pkg:ebuild/net-fs/samba@4.11.6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.11.6" } ], "aliases": [ "CVE-2019-10197" ], "risk_score": 4.1, "exploitability": "0.5", "weighted_severity": "8.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ycau-9h17-quf3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47951?format=api", "vulnerability_id": "VCID-ycm6-j6gt-p7ar", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10918.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10918.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10918", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04257", "scoring_system": "epss", "scoring_elements": "0.88761", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04257", "scoring_system": "epss", "scoring_elements": "0.88769", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04257", "scoring_system": "epss", "scoring_elements": "0.88785", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04257", "scoring_system": "epss", "scoring_elements": "0.88787", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04257", "scoring_system": "epss", "scoring_elements": "0.88804", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04257", "scoring_system": "epss", "scoring_elements": "0.8881", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04257", "scoring_system": "epss", "scoring_elements": "0.88822", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04257", "scoring_system": "epss", "scoring_elements": "0.88816", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04257", "scoring_system": "epss", "scoring_elements": "0.88831", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04257", "scoring_system": "epss", "scoring_elements": "0.88829", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04257", "scoring_system": "epss", "scoring_elements": "0.88826", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04257", "scoring_system": "epss", "scoring_elements": "0.88842", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.04257", "scoring_system": "epss", "scoring_elements": "0.88848", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.04257", "scoring_system": "epss", "scoring_elements": "0.88857", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.04257", "scoring_system": "epss", "scoring_elements": "0.88874", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.04257", "scoring_system": "epss", "scoring_elements": "0.88886", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.04257", "scoring_system": "epss", "scoring_elements": "0.8888", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.04257", "scoring_system": "epss", "scoring_elements": "0.88891", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.04257", "scoring_system": "epss", "scoring_elements": "0.88908", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10918" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10918", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10918" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610640", "reference_id": "1610640", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610640" }, { "reference_url": "https://security.gentoo.org/glsa/202003-52", "reference_id": "GLSA-202003-52", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-52" }, { "reference_url": "https://usn.ubuntu.com/3738-1/", "reference_id": "USN-3738-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3738-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77322?format=api", "purl": "pkg:ebuild/net-fs/samba@4.11.6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.11.6" } ], "aliases": [ "CVE-2018-10918" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ycm6-j6gt-p7ar" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.11.6" }