Lookup for vulnerable packages by Package URL.

GET /api/packages/77521?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/77521?format=api",
    "purl": "pkg:ebuild/net-fs/samba@4.18.4",
    "type": "ebuild",
    "namespace": "net-fs",
    "name": "samba",
    "version": "4.18.4",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "4.18.9",
    "latest_non_vulnerable_version": "4.18.9",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48504?format=api",
            "vulnerability_id": "VCID-18xs-py1v-xfey",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0225.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0225.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0225",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5787",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57823",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57798",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57853",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57854",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57849",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57828",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57857",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57856",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61491",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61502",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61453",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61562",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61523",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61551",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61602",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61505",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61507",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00464",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64299",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0225"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0225",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0225"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182772",
                    "reference_id": "2182772",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182772"
                },
                {
                    "reference_url": "https://www.samba.org/samba/security/CVE-2023-0225.html",
                    "reference_id": "CVE-2023-0225.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-18T15:04:24Z/"
                        }
                    ],
                    "url": "https://www.samba.org/samba/security/CVE-2023-0225.html"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-18T15:04:24Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230406-0007/",
                    "reference_id": "ntap-20230406-0007",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-18T15:04:24Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230406-0007/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77521?format=api",
                    "purl": "pkg:ebuild/net-fs/samba@4.18.4",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.18.4"
                }
            ],
            "aliases": [
                "CVE-2023-0225"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-18xs-py1v-xfey"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47300?format=api",
            "vulnerability_id": "VCID-3du2-evy8-jfa1",
            "summary": "Multiple vulnerabilities have been discovered in MIT krb5, the worst of which could lead to remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42898.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42898.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.08257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92245",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.08257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9225",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.08257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92249",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.08734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92555",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.08734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92549",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.08734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92545",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.08734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92535",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.08734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92524",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.08734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92515",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.08734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9258",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.08889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9254",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.08889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92532",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.08889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92575",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.08889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92565",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.08889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92564",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.08889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92558",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.08889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92553",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.08889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92542",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187",
                    "reference_id": "1024187",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024267",
                    "reference_id": "1024267",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024267"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140960",
                    "reference_id": "2140960",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140960"
                },
                {
                    "reference_url": "https://web.mit.edu/kerberos/advisories/",
                    "reference_id": "advisories",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"
                        }
                    ],
                    "url": "https://web.mit.edu/kerberos/advisories/"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2828",
                    "reference_id": "AVG-2828",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Unknown",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2828"
                },
                {
                    "reference_url": "https://www.samba.org/samba/security/CVE-2022-42898.html",
                    "reference_id": "CVE-2022-42898.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"
                        }
                    ],
                    "url": "https://www.samba.org/samba/security/CVE-2022-42898.html"
                },
                {
                    "reference_url": "https://github.com/krb5/krb5/commit/ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583",
                    "reference_id": "ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"
                        }
                    ],
                    "url": "https://github.com/krb5/krb5/commit/ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583"
                },
                {
                    "reference_url": "https://github.com/heimdal/heimdal/security/advisories/GHSA-64mq-fvfj-5x3c",
                    "reference_id": "GHSA-64mq-fvfj-5x3c",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"
                        }
                    ],
                    "url": "https://github.com/heimdal/heimdal/security/advisories/GHSA-64mq-fvfj-5x3c"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202310-06",
                    "reference_id": "GLSA-202310-06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202310-06"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-11",
                    "reference_id": "GLSA-202405-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-11"
                },
                {
                    "reference_url": "https://web.mit.edu/kerberos/krb5-1.19/",
                    "reference_id": "krb5-1.19",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"
                        }
                    ],
                    "url": "https://web.mit.edu/kerberos/krb5-1.19/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230216-0008/",
                    "reference_id": "ntap-20230216-0008",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230216-0008/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230223-0001/",
                    "reference_id": "ntap-20230223-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230223-0001/"
                },
                {
                    "reference_url": "https://web.mit.edu/kerberos/krb5-1.20/README-1.20.1.txt",
                    "reference_id": "README-1.20.1.txt",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"
                        }
                    ],
                    "url": "https://web.mit.edu/kerberos/krb5-1.20/README-1.20.1.txt"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8637",
                    "reference_id": "RHSA-2022:8637",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8637"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8638",
                    "reference_id": "RHSA-2022:8638",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8638"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8639",
                    "reference_id": "RHSA-2022:8639",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8639"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8640",
                    "reference_id": "RHSA-2022:8640",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8640"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8641",
                    "reference_id": "RHSA-2022:8641",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8641"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8648",
                    "reference_id": "RHSA-2022:8648",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8648"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8662",
                    "reference_id": "RHSA-2022:8662",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8662"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8663",
                    "reference_id": "RHSA-2022:8663",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8663"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8669",
                    "reference_id": "RHSA-2022:8669",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8669"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9029",
                    "reference_id": "RHSA-2022:9029",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9029"
                },
                {
                    "reference_url": "https://bugzilla.samba.org/show_bug.cgi?id=15203",
                    "reference_id": "show_bug.cgi?id=15203",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"
                        }
                    ],
                    "url": "https://bugzilla.samba.org/show_bug.cgi?id=15203"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5800-1/",
                    "reference_id": "USN-5800-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5800-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5822-1/",
                    "reference_id": "USN-5822-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5822-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5828-1/",
                    "reference_id": "USN-5828-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5828-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5936-1/",
                    "reference_id": "USN-5936-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5936-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7582-1/",
                    "reference_id": "USN-7582-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7582-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77521?format=api",
                    "purl": "pkg:ebuild/net-fs/samba@4.18.4",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.18.4"
                }
            ],
            "aliases": [
                "CVE-2022-42898"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3du2-evy8-jfa1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48483?format=api",
            "vulnerability_id": "VCID-47k4-8k1s-zff2",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23192.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23192.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23192",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28234",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28652",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28604",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2849",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28378",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28302",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28143",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28201",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28224",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28141",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28161",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30999",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31002",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31044",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3103",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31128",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31176",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30996",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31052",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31081",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31088",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23192"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019666",
                    "reference_id": "2019666",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019666"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2538",
                    "reference_id": "AVG-2538",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2538"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4843",
                    "reference_id": "RHSA-2021:4843",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4843"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5082",
                    "reference_id": "RHSA-2021:5082",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5082"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0008",
                    "reference_id": "RHSA-2022:0008",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0008"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5142-1/",
                    "reference_id": "USN-5142-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5142-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77521?format=api",
                    "purl": "pkg:ebuild/net-fs/samba@4.18.4",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.18.4"
                }
            ],
            "aliases": [
                "CVE-2021-23192"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-47k4-8k1s-zff2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48502?format=api",
            "vulnerability_id": "VCID-5cd3-497h-qkhw",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38023.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38023.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38023",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00354",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57789",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00354",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57735",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00354",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57757",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00354",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5773",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00354",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57785",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00354",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57787",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00354",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57804",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00354",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57782",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00354",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57761",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00464",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64514",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00464",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64376",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00464",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64421",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00464",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64467",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00464",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64436",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00464",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64461",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00481",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6515",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00481",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65162",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00481",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65134",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00481",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65149",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00481",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65163",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38023"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38023",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38023"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154362",
                    "reference_id": "2154362",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154362"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2828",
                    "reference_id": "AVG-2828",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Unknown",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2828"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0637",
                    "reference_id": "RHSA-2023:0637",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0637"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0638",
                    "reference_id": "RHSA-2023:0638",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0638"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0639",
                    "reference_id": "RHSA-2023:0639",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0639"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0838",
                    "reference_id": "RHSA-2023:0838",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0838"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:1090",
                    "reference_id": "RHSA-2023:1090",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:1090"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2127",
                    "reference_id": "RHSA-2023:2127",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2127"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2136",
                    "reference_id": "RHSA-2023:2136",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2136"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2137",
                    "reference_id": "RHSA-2023:2137",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2137"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3491",
                    "reference_id": "RHSA-2023:3491",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3491"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5822-1/",
                    "reference_id": "USN-5822-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5822-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5936-1/",
                    "reference_id": "USN-5936-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5936-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77521?format=api",
                    "purl": "pkg:ebuild/net-fs/samba@4.18.4",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.18.4"
                }
            ],
            "aliases": [
                "CVE-2022-38023"
            ],
            "risk_score": 3.6,
            "exploitability": "0.5",
            "weighted_severity": "7.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5cd3-497h-qkhw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48475?format=api",
            "vulnerability_id": "VCID-5vyg-1jzr-ebh8",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25718.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25718.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25718",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4183",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41547",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41447",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41472",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41895",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41923",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41755",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41805",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41815",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41838",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41806",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41793",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41842",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41743",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4167",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41671",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41592",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41452",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41521",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41537",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25718"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019726",
                    "reference_id": "2019726",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019726"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2538",
                    "reference_id": "AVG-2538",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2538"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5142-1/",
                    "reference_id": "USN-5142-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5142-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77521?format=api",
                    "purl": "pkg:ebuild/net-fs/samba@4.18.4",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.18.4"
                }
            ],
            "aliases": [
                "CVE-2020-25718"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5vyg-1jzr-ebh8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48494?format=api",
            "vulnerability_id": "VCID-6mju-nwzy-pqeq",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32743.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32743.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32743",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78461",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78492",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78475",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78502",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78507",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78532",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78514",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78506",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78534",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78533",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78531",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78564",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78571",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78588",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78605",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78629",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78644",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.01153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78641",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.01153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78657",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.01153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78696",
                            "published_at": "2026-05-14T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32743"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32743",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32743"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021022",
                    "reference_id": "1021022",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021022"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2121128",
                    "reference_id": "2121128",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2121128"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77521?format=api",
                    "purl": "pkg:ebuild/net-fs/samba@4.18.4",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.18.4"
                }
            ],
            "aliases": [
                "CVE-2022-32743"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6mju-nwzy-pqeq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48485?format=api",
            "vulnerability_id": "VCID-7bb1-3ny6-rbbv",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44142.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44142.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-44142",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.30651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96697",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.30651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96687",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.30651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96699",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.32269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96823",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.32269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96831",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.35695",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97097",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.35695",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97114",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.35695",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97108",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.35695",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97121",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.35695",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97094",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.35695",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97104",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.37405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97181",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.37405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97197",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.37405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97195",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.37405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97191",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.37405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97188",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.37405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97198",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.37405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97175",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.37405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97179",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.37405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9718",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-44142"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44142",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44142"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004693",
                    "reference_id": "1004693",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004693"
                },
                {
                    "reference_url": "https://kb.cert.org/vuls/id/119678",
                    "reference_id": "119678",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:30:59Z/"
                        }
                    ],
                    "url": "https://kb.cert.org/vuls/id/119678"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046146",
                    "reference_id": "2046146",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046146"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2648",
                    "reference_id": "AVG-2648",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2648"
                },
                {
                    "reference_url": "https://www.zerodayinitiative.com/blog/2022/2/1/cve-2021-44142-details-on-a-samba-code-execution-bug-demonstrated-at-pwn2own-austin",
                    "reference_id": "cve-2021-44142-details-on-a-samba-code-execution-bug-demonstrated-at-pwn2own-austin",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:30:59Z/"
                        }
                    ],
                    "url": "https://www.zerodayinitiative.com/blog/2022/2/1/cve-2021-44142-details-on-a-samba-code-execution-bug-demonstrated-at-pwn2own-austin"
                },
                {
                    "reference_url": "https://www.samba.org/samba/security/CVE-2021-44142.html",
                    "reference_id": "CVE-2021-44142.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:30:59Z/"
                        }
                    ],
                    "url": "https://www.samba.org/samba/security/CVE-2021-44142.html"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:30:59Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0328",
                    "reference_id": "RHSA-2022:0328",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0328"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0329",
                    "reference_id": "RHSA-2022:0329",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0329"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0330",
                    "reference_id": "RHSA-2022:0330",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0330"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0331",
                    "reference_id": "RHSA-2022:0331",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0331"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0332",
                    "reference_id": "RHSA-2022:0332",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0332"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0457",
                    "reference_id": "RHSA-2022:0457",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0457"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0458",
                    "reference_id": "RHSA-2022:0458",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0458"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0663",
                    "reference_id": "RHSA-2022:0663",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0663"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0664",
                    "reference_id": "RHSA-2022:0664",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0664"
                },
                {
                    "reference_url": "https://bugzilla.samba.org/show_bug.cgi?id=14914",
                    "reference_id": "show_bug.cgi?id=14914",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:30:59Z/"
                        }
                    ],
                    "url": "https://bugzilla.samba.org/show_bug.cgi?id=14914"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5260-1/",
                    "reference_id": "USN-5260-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5260-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5260-2/",
                    "reference_id": "USN-5260-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5260-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5260-3/",
                    "reference_id": "USN-5260-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5260-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77521?format=api",
                    "purl": "pkg:ebuild/net-fs/samba@4.18.4",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.18.4"
                }
            ],
            "aliases": [
                "CVE-2021-44142"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7bb1-3ny6-rbbv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48492?format=api",
            "vulnerability_id": "VCID-7rcm-14da-ybdv",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3592.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3592.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3592",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70575",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70444",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70424",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70475",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70484",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70458",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70497",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70528",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70523",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7036",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70338",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70384",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70398",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70422",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70407",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70393",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70435",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00828",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74463",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3592"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137776",
                    "reference_id": "2137776",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T15:14:01Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137776"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2022-3592",
                    "reference_id": "CVE-2022-3592",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T15:14:01Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2022-3592"
                },
                {
                    "reference_url": "https://www.samba.org/samba/security/CVE-2022-3592.html",
                    "reference_id": "CVE-2022-3592.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T15:14:01Z/"
                        }
                    ],
                    "url": "https://www.samba.org/samba/security/CVE-2022-3592.html"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T15:14:01Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77521?format=api",
                    "purl": "pkg:ebuild/net-fs/samba@4.18.4",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.18.4"
                }
            ],
            "aliases": [
                "CVE-2022-3592"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7rcm-14da-ybdv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48503?format=api",
            "vulnerability_id": "VCID-7xdg-sn88-bkbs",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45141.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45141.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-45141",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71534",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.0067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71425",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71412",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71448",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71483",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.0067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71449",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.0067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71478",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.0067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7129",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71308",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71282",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71324",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71337",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7136",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71345",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71328",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71374",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71381",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71361",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71413",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71421",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-45141"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45141",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45141"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154376",
                    "reference_id": "2154376",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154376"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2828",
                    "reference_id": "AVG-2828",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Unknown",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2828"
                },
                {
                    "reference_url": "https://www.samba.org/samba/security/CVE-2022-45141.html",
                    "reference_id": "CVE-2022-45141.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-03-06T20:38:03Z/"
                        }
                    ],
                    "url": "https://www.samba.org/samba/security/CVE-2022-45141.html"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-03-06T20:38:03Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5822-1/",
                    "reference_id": "USN-5822-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5822-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5936-1/",
                    "reference_id": "USN-5936-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5936-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7582-1/",
                    "reference_id": "USN-7582-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7582-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77521?format=api",
                    "purl": "pkg:ebuild/net-fs/samba@4.18.4",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.18.4"
                }
            ],
            "aliases": [
                "CVE-2022-45141"
            ],
            "risk_score": 3.6,
            "exploitability": "0.5",
            "weighted_severity": "7.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7xdg-sn88-bkbs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48501?format=api",
            "vulnerability_id": "VCID-84q8-2457-qkc5",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-37967.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-37967.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-37967",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02981",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86663",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.02981",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86605",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.02981",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86622",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.02981",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86618",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.02981",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86629",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.02981",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86474",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02981",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86492",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02981",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86511",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02981",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8652",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02981",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86535",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02981",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86532",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02981",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86526",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02981",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86541",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02981",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86547",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02981",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8654",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02981",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86558",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02981",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86567",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02981",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86566",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.02981",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86587",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-37967"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37967",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37967"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154320",
                    "reference_id": "2154320",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154320"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2828",
                    "reference_id": "AVG-2828",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Unknown",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2828"
                },
                {
                    "reference_url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37967",
                    "reference_id": "CVE-2022-37967",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T13:57:00Z/"
                        }
                    ],
                    "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37967"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5822-1/",
                    "reference_id": "USN-5822-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5822-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5936-1/",
                    "reference_id": "USN-5936-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5936-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77521?format=api",
                    "purl": "pkg:ebuild/net-fs/samba@4.18.4",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.18.4"
                }
            ],
            "aliases": [
                "CVE-2022-37967"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-84q8-2457-qkc5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48484?format=api",
            "vulnerability_id": "VCID-94k8-98me-x3dw",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44141.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44141.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-44141",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54101",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54029",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53949",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53991",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54047",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54005",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5403",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54013",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5406",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54042",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54024",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54064",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54068",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54051",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54018",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54041",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5407",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53997",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54015",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54018",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-44141"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44141",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44141"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004692",
                    "reference_id": "1004692",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004692"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046120",
                    "reference_id": "2046120",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046120"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2648",
                    "reference_id": "AVG-2648",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2648"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1756",
                    "reference_id": "RHSA-2022:1756",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1756"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:2074",
                    "reference_id": "RHSA-2022:2074",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:2074"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77521?format=api",
                    "purl": "pkg:ebuild/net-fs/samba@4.18.4",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.18.4"
                }
            ],
            "aliases": [
                "CVE-2021-44141"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-94k8-98me-x3dw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48487?format=api",
            "vulnerability_id": "VCID-b4ty-d775-5fed",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1615.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1615.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00259",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4932",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00259",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49261",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00259",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49176",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00259",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4924",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00259",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49267",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00259",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49217",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00259",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49245",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50161",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50167",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50175",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00285",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52024",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00285",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5203",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00285",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51872",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00285",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51964",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00285",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51998",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00285",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51982",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00285",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52015",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00285",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5192",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00285",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51947",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00285",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51911",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00285",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51965",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1615"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1615"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021024",
                    "reference_id": "1021024",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021024"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122649",
                    "reference_id": "2122649",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122649"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2519",
                    "reference_id": "RHSA-2023:2519",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2519"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2987",
                    "reference_id": "RHSA-2023:2987",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2987"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0423",
                    "reference_id": "RHSA-2024:0423",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0423"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77521?format=api",
                    "purl": "pkg:ebuild/net-fs/samba@4.18.4",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.18.4"
                }
            ],
            "aliases": [
                "CVE-2022-1615"
            ],
            "risk_score": 2.3,
            "exploitability": "0.5",
            "weighted_severity": "4.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b4ty-d775-5fed"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48507?format=api",
            "vulnerability_id": "VCID-bpht-9daq-rfgd",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0922.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0922.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0922",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00229",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45679",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00229",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45722",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00229",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45699",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00229",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45647",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00229",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45703",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00229",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45692",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00229",
                            "scoring_system": "epss",
                            "scoring_elements": "0.457",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00229",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45749",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00229",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45744",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00266",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50098",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00266",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50089",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00266",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50043",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00266",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49961",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00266",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50085",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00266",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50016",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00266",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50045",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00266",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49996",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00266",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50026",
                            "published_at": "2026-05-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0922"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0922",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0922"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182774",
                    "reference_id": "2182774",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182774"
                },
                {
                    "reference_url": "https://www.samba.org/samba/security/CVE-2023-0922.html",
                    "reference_id": "CVE-2023-0922.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T14:54:28Z/"
                        }
                    ],
                    "url": "https://www.samba.org/samba/security/CVE-2023-0922.html"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T14:54:28Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230406-0007/",
                    "reference_id": "ntap-20230406-0007",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T14:54:28Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230406-0007/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5993-1/",
                    "reference_id": "USN-5993-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5993-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YXBPYIA4VWNOD437NAHZ3NXKAETLFB5S/",
                    "reference_id": "YXBPYIA4VWNOD437NAHZ3NXKAETLFB5S",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T14:54:28Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YXBPYIA4VWNOD437NAHZ3NXKAETLFB5S/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77521?format=api",
                    "purl": "pkg:ebuild/net-fs/samba@4.18.4",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.18.4"
                }
            ],
            "aliases": [
                "CVE-2023-0922"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bpht-9daq-rfgd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48472?format=api",
            "vulnerability_id": "VCID-ezk6-jy86-y3h4",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2124.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2124.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2124",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00699",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72152",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00699",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72052",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00699",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72044",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00699",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72077",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00699",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72104",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00699",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72068",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00699",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72095",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00699",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71931",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00699",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7197",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00699",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71982",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00699",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72006",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00699",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71989",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00699",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71974",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00699",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72015",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00699",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72022",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00699",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72007",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00699",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72051",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00699",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72057",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00814",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74225",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00814",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74252",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00814",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7422",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2124"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:A/AC:M/Au:N/C:P/I:N/A:N"
                        },
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019660",
                    "reference_id": "2019660",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019660"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2539",
                    "reference_id": "AVG-2539",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2539"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4843",
                    "reference_id": "RHSA-2021:4843",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4843"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4844",
                    "reference_id": "RHSA-2021:4844",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4844"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5082",
                    "reference_id": "RHSA-2021:5082",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5082"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5192",
                    "reference_id": "RHSA-2021:5192",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5192"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0008",
                    "reference_id": "RHSA-2022:0008",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0008"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0074",
                    "reference_id": "RHSA-2022:0074",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0074"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5142-1/",
                    "reference_id": "USN-5142-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5142-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5174-1/",
                    "reference_id": "USN-5174-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5174-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77521?format=api",
                    "purl": "pkg:ebuild/net-fs/samba@4.18.4",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.18.4"
                }
            ],
            "aliases": [
                "CVE-2016-2124"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ezk6-jy86-y3h4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48493?format=api",
            "vulnerability_id": "VCID-f772-3dtd-wba8",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32742.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32742.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32742",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00272",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50607",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00574",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68904",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00574",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6879",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00574",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68796",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00574",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68802",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00574",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68782",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00574",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68825",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00574",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6886",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00574",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68826",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00574",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68851",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00574",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68685",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00574",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68662",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00574",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68714",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00574",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68732",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00574",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68754",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00574",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6874",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00574",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68711",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00574",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68753",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00574",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68764",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00574",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68742",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32742"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449",
                    "reference_id": "1016449",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108196",
                    "reference_id": "2108196",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108196"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2782",
                    "reference_id": "AVG-2782",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2782"
                },
                {
                    "reference_url": "https://www.samba.org/samba/security/CVE-2022-32742.html",
                    "reference_id": "CVE-2022-32742.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T19:44:06Z/"
                        }
                    ],
                    "url": "https://www.samba.org/samba/security/CVE-2022-32742.html"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T19:44:06Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html",
                    "reference_id": "msg00015.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T19:44:06Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7056",
                    "reference_id": "RHSA-2022:7056",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7056"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7111",
                    "reference_id": "RHSA-2022:7111",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7111"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8317",
                    "reference_id": "RHSA-2022:8317",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8317"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5542-1/",
                    "reference_id": "USN-5542-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5542-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77521?format=api",
                    "purl": "pkg:ebuild/net-fs/samba@4.18.4",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.18.4"
                }
            ],
            "aliases": [
                "CVE-2022-32742"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f772-3dtd-wba8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48476?format=api",
            "vulnerability_id": "VCID-f9hv-k2xk-puhq",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25719.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25719.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25719",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00213",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43689",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00213",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43565",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00213",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43641",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00213",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43658",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00213",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43594",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00213",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43625",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00213",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43809",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00213",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43859",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00213",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43862",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00213",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4388",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00213",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43848",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00213",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43831",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00213",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43893",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00213",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43885",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00213",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43818",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00213",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4377",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00213",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43773",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00213",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43692",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00248",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4808",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00248",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48101",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00248",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48042",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25719"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019732",
                    "reference_id": "2019732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019732"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2538",
                    "reference_id": "AVG-2538",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2538"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5142",
                    "reference_id": "RHSA-2021:5142",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5142"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5195",
                    "reference_id": "RHSA-2021:5195",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5195"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0007",
                    "reference_id": "RHSA-2022:0007",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0007"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0076",
                    "reference_id": "RHSA-2022:0076",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0076"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5142-1/",
                    "reference_id": "USN-5142-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5142-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77521?format=api",
                    "purl": "pkg:ebuild/net-fs/samba@4.18.4",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.18.4"
                }
            ],
            "aliases": [
                "CVE-2020-25719"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f9hv-k2xk-puhq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48481?format=api",
            "vulnerability_id": "VCID-fskg-j9fe-6yeg",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20251.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20251.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20251",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44742",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44822",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44659",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44535",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44605",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4462",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44557",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44586",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44843",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44783",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44836",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44838",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44855",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44824",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44826",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44879",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44872",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44807",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4472",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44727",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4465",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20251"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20251",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20251"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1929800",
                    "reference_id": "1929800",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:49:41Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1929800"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:49:41Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230331-0005/",
                    "reference_id": "ntap-20230331-0005",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:49:41Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230331-0005/"
                },
                {
                    "reference_url": "https://bugzilla.samba.org/show_bug.cgi?id=14611",
                    "reference_id": "show_bug.cgi?id=14611",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:49:41Z/"
                        }
                    ],
                    "url": "https://bugzilla.samba.org/show_bug.cgi?id=14611"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5822-1/",
                    "reference_id": "USN-5822-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5822-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77521?format=api",
                    "purl": "pkg:ebuild/net-fs/samba@4.18.4",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.18.4"
                }
            ],
            "aliases": [
                "CVE-2021-20251"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fskg-j9fe-6yeg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48474?format=api",
            "vulnerability_id": "VCID-gs98-hcdd-2yf9",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25717.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25717.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25717",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00517",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6687",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00517",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66727",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00517",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66771",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00517",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66812",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00517",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66785",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00517",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66806",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00517",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66649",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00517",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66698",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00517",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66713",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00517",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66732",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00517",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6672",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00517",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6669",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00517",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66723",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00517",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66737",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00517",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66722",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00517",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66746",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00517",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66758",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00517",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66756",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66712",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66738",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66673",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25717"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019672",
                    "reference_id": "2019672",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019672"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2538",
                    "reference_id": "AVG-2538",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2538"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4843",
                    "reference_id": "RHSA-2021:4843",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4843"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4844",
                    "reference_id": "RHSA-2021:4844",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4844"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5082",
                    "reference_id": "RHSA-2021:5082",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5082"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5192",
                    "reference_id": "RHSA-2021:5192",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5192"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0008",
                    "reference_id": "RHSA-2022:0008",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0008"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0074",
                    "reference_id": "RHSA-2022:0074",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0074"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0133",
                    "reference_id": "RHSA-2022:0133",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0133"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0443",
                    "reference_id": "RHSA-2022:0443",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0443"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5142-1/",
                    "reference_id": "USN-5142-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5142-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5174-1/",
                    "reference_id": "USN-5174-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5174-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77521?format=api",
                    "purl": "pkg:ebuild/net-fs/samba@4.18.4",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.18.4"
                }
            ],
            "aliases": [
                "CVE-2020-25717"
            ],
            "risk_score": 3.6,
            "exploitability": "0.5",
            "weighted_severity": "7.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gs98-hcdd-2yf9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48506?format=api",
            "vulnerability_id": "VCID-hfsk-4cbd-m3b1",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0614.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0614.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0614",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40713",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40714",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40636",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40687",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40696",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40678",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40659",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40704",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40674",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44409",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44413",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44332",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44206",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44284",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44334",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44492",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44301",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44236",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44266",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00246",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47868",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0614"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0614",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0614"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182776",
                    "reference_id": "2182776",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182776"
                },
                {
                    "reference_url": "https://www.samba.org/samba/security/CVE-2023-0614.html",
                    "reference_id": "CVE-2023-0614.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T14:52:15Z/"
                        }
                    ],
                    "url": "https://www.samba.org/samba/security/CVE-2023-0614.html"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T14:52:15Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230406-0007/",
                    "reference_id": "ntap-20230406-0007",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T14:52:15Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230406-0007/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5992-1/",
                    "reference_id": "USN-5992-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5992-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5993-1/",
                    "reference_id": "USN-5993-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5993-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YXBPYIA4VWNOD437NAHZ3NXKAETLFB5S/",
                    "reference_id": "YXBPYIA4VWNOD437NAHZ3NXKAETLFB5S",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T14:52:15Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YXBPYIA4VWNOD437NAHZ3NXKAETLFB5S/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77521?format=api",
                    "purl": "pkg:ebuild/net-fs/samba@4.18.4",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.18.4"
                }
            ],
            "aliases": [
                "CVE-2023-0614"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "6.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hfsk-4cbd-m3b1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48478?format=api",
            "vulnerability_id": "VCID-hnhm-ud2a-nugz",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25722.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25722.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61527",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61376",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61425",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61485",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61446",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61474",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61351",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61398",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61414",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61435",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6142",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61401",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61439",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61443",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61427",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61415",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61429",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61424",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00412",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61415",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00412",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61443",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00412",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61338",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25722"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019764",
                    "reference_id": "2019764",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019764"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2538",
                    "reference_id": "AVG-2538",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2538"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5142-1/",
                    "reference_id": "USN-5142-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5142-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5174-1/",
                    "reference_id": "USN-5174-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5174-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77521?format=api",
                    "purl": "pkg:ebuild/net-fs/samba@4.18.4",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.18.4"
                }
            ],
            "aliases": [
                "CVE-2020-25722"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hnhm-ud2a-nugz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48489?format=api",
            "vulnerability_id": "VCID-hzy4-16j5-8qcf",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2031.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2031.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2031",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5542",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55385",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55363",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55414",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55424",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55403",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55384",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5756",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57626",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57521",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57584",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57533",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57525",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57544",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57524",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57475",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00422",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62033",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2031"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449",
                    "reference_id": "1016449",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094789",
                    "reference_id": "2094789",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094789"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2782",
                    "reference_id": "AVG-2782",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2782"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5542-1/",
                    "reference_id": "USN-5542-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5542-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77521?format=api",
                    "purl": "pkg:ebuild/net-fs/samba@4.18.4",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.18.4"
                }
            ],
            "aliases": [
                "CVE-2022-2031"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hzy4-16j5-8qcf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48486?format=api",
            "vulnerability_id": "VCID-m44e-rw2w-vuhj",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0336.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0336.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0336",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59459",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59696",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59598",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59626",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59531",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59556",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59525",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59576",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59589",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59607",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59591",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59571",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59604",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59611",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59595",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59567",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59587",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59573",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59534",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59583",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59641",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0336"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0336",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0336"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004694",
                    "reference_id": "1004694",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004694"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046134",
                    "reference_id": "2046134",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046134"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2648",
                    "reference_id": "AVG-2648",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2648"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5260-1/",
                    "reference_id": "USN-5260-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5260-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77521?format=api",
                    "purl": "pkg:ebuild/net-fs/samba@4.18.4",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.18.4"
                }
            ],
            "aliases": [
                "CVE-2022-0336"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m44e-rw2w-vuhj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48471?format=api",
            "vulnerability_id": "VCID-mtxv-v2pu-f3bn",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4559.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4559.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-4559",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.89029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99535",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.89029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99534",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.89029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99536",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.8971",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99569",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.8971",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99574",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.90194",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99601",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.90194",
                            "scoring_system": "epss",
                            "scoring_elements": "0.996",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.90582",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99615",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.90582",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99614",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.90582",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99611",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.90582",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99613",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.90582",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99612",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.90636",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99618",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.90636",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99619",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-4559"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://mail.python.org/pipermail/python-dev/2007-August/074290.html",
                    "reference_id": "074290.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-01-17T14:48:13Z/"
                        }
                    ],
                    "url": "http://mail.python.org/pipermail/python-dev/2007-August/074290.html"
                },
                {
                    "reference_url": "http://mail.python.org/pipermail/python-dev/2007-August/074292.html",
                    "reference_id": "074292.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-01-17T14:48:13Z/"
                        }
                    ],
                    "url": "http://mail.python.org/pipermail/python-dev/2007-August/074292.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=263261",
                    "reference_id": "263261",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-01-17T14:48:13Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=263261"
                },
                {
                    "reference_url": "http://secunia.com/advisories/26623",
                    "reference_id": "26623",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-01-17T14:48:13Z/"
                        }
                    ],
                    "url": "http://secunia.com/advisories/26623"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2007/3022",
                    "reference_id": "3022",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-01-17T14:48:13Z/"
                        }
                    ],
                    "url": "http://www.vupen.com/english/advisories/2007/3022"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CVBB7NU3YIRRDOKLYVN647WPRR3IAKR6/",
                    "reference_id": "CVBB7NU3YIRRDOKLYVN647WPRR3IAKR6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-01-17T14:48:13Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CVBB7NU3YIRRDOKLYVN647WPRR3IAKR6/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FI55PGL47ES3OU2FQPGEHOI2EK3S2OBH/",
                    "reference_id": "FI55PGL47ES3OU2FQPGEHOI2EK3S2OBH",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-01-17T14:48:13Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FI55PGL47ES3OU2FQPGEHOI2EK3S2OBH/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-01-17T14:48:13Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KA4Z44ZAI4SY7THCFBUDNT5EEFO4XQ3A/",
                    "reference_id": "KA4Z44ZAI4SY7THCFBUDNT5EEFO4XQ3A",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-01-17T14:48:13Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KA4Z44ZAI4SY7THCFBUDNT5EEFO4XQ3A/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6324",
                    "reference_id": "RHSA-2023:6324",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6324"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6494",
                    "reference_id": "RHSA-2023:6494",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6494"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6659",
                    "reference_id": "RHSA-2023:6659",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6659"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6694",
                    "reference_id": "RHSA-2023:6694",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6694"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6793",
                    "reference_id": "RHSA-2023:6793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6793"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6914",
                    "reference_id": "RHSA-2023:6914",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6914"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7024",
                    "reference_id": "RHSA-2023:7024",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7024"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7034",
                    "reference_id": "RHSA-2023:7034",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7034"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7050",
                    "reference_id": "RHSA-2023:7050",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7050"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7151",
                    "reference_id": "RHSA-2023:7151",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7151"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7176",
                    "reference_id": "RHSA-2023:7176",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7176"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0374",
                    "reference_id": "RHSA-2024:0374",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0374"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0430",
                    "reference_id": "RHSA-2024:0430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0430"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0587",
                    "reference_id": "RHSA-2024:0587",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0587"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77521?format=api",
                    "purl": "pkg:ebuild/net-fs/samba@4.18.4",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.18.4"
                }
            ],
            "aliases": [
                "CVE-2007-4559"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mtxv-v2pu-f3bn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48477?format=api",
            "vulnerability_id": "VCID-mw6j-fkm4-pkg2",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25721.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25721.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25721",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00366",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58724",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00366",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58566",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00366",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58611",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00366",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58669",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00366",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58625",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00366",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58654",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00367",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58633",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00367",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58691",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00367",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58709",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00367",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5869",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00367",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5867",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00367",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58703",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00367",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58707",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00367",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58653",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00367",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58652",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00367",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58562",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00367",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58667",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00367",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58685",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00367",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58646",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25721"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2021728",
                    "reference_id": "2021728",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2021728"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2538",
                    "reference_id": "AVG-2538",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2538"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5142-1/",
                    "reference_id": "USN-5142-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5142-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77521?format=api",
                    "purl": "pkg:ebuild/net-fs/samba@4.18.4",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.18.4"
                }
            ],
            "aliases": [
                "CVE-2020-25721"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mw6j-fkm4-pkg2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48473?format=api",
            "vulnerability_id": "VCID-q3n2-67dg-mkgg",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-17049.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-17049.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-17049",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.248",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96128",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.248",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96114",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.248",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96121",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.248",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96132",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96339",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96332",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96335",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96342",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9635",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96355",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96356",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96357",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.27483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96438",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.27483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96447",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.27483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96454",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.27483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96457",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.27483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96462",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.27483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96472",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.27483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96436",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.27483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96445",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-17049"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025721",
                    "reference_id": "2025721",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025721"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2021/11/10/3",
                    "reference_id": "3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-15T16:12:34Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2021/11/10/3"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1110:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1110:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1110:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25661:*:*:*:*:*:x64:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25661:*:*:*:*:*:x64:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25661:*:*:*:*:*:x64:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21167:*:*:*:*:*:x64:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21167:*:*:*:*:*:x64:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21167:*:*:*:*:*:x64:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21167:*:*:*:*:*:x86:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21167:*:*:*:*:*:x86:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21167:*:*:*:*:*:x86:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23409:*:*:*:*:*:x64:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23409:*:*:*:*:*:x64:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23409:*:*:*:*:*:x64:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20069:*:*:*:*:*:x64:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20069:*:*:*:*:*:x64:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20069:*:*:*:*:*:x64:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4530:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4530:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4530:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2061:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2061:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2061:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_20H2:10.0.19041.1110:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19041.1110:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_20H2:10.0.19041.1110:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17049",
                    "reference_id": "CVE-2020-17049",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-15T16:12:34Z/"
                        }
                    ],
                    "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17049"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-15T16:12:34Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2570",
                    "reference_id": "RHSA-2023:2570",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2570"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0137",
                    "reference_id": "RHSA-2024:0137",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0137"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0139",
                    "reference_id": "RHSA-2024:0139",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0139"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0143",
                    "reference_id": "RHSA-2024:0143",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0143"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77521?format=api",
                    "purl": "pkg:ebuild/net-fs/samba@4.18.4",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.18.4"
                }
            ],
            "aliases": [
                "CVE-2020-17049"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q3n2-67dg-mkgg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48497?format=api",
            "vulnerability_id": "VCID-rgu3-rgej-aucp",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32745.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32745.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00425",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62253",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00425",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62185",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00425",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62153",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00425",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62203",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00425",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62221",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00425",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62238",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00425",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62228",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00425",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62207",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00425",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6226",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00425",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62244",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00461",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64246",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00461",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64272",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00461",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6419",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00461",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64234",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00461",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6428",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00461",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64325",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00461",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64207",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00461",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64221",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00555",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68055",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32745"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449",
                    "reference_id": "1016449",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108211",
                    "reference_id": "2108211",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108211"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2782",
                    "reference_id": "AVG-2782",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2782"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5542-1/",
                    "reference_id": "USN-5542-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5542-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77521?format=api",
                    "purl": "pkg:ebuild/net-fs/samba@4.18.4",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.18.4"
                }
            ],
            "aliases": [
                "CVE-2022-32745"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rgu3-rgej-aucp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48490?format=api",
            "vulnerability_id": "VCID-s2ne-rcp3-nbgz",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3437.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3437.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3437",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72746",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72529",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7256",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72572",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72596",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72579",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72568",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7261",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72621",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72612",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72654",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72663",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72659",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7265",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72681",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72705",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72668",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72694",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72545",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72522",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3437"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/02/08/1",
                    "reference_id": "1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2023/02/08/1"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187",
                    "reference_id": "1024187",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137774",
                    "reference_id": "2137774",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137774"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2828",
                    "reference_id": "AVG-2828",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Unknown",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2828"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2022-3437",
                    "reference_id": "CVE-2022-3437",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2022-3437"
                },
                {
                    "reference_url": "https://www.samba.org/samba/security/CVE-2022-3437.html",
                    "reference_id": "CVE-2022-3437.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/"
                        }
                    ],
                    "url": "https://www.samba.org/samba/security/CVE-2022-3437.html"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202310-06",
                    "reference_id": "GLSA-202310-06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202310-06"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html",
                    "reference_id": "msg00015.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230216-0008/",
                    "reference_id": "ntap-20230216-0008",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230216-0008/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5800-1/",
                    "reference_id": "USN-5800-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5800-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5822-1/",
                    "reference_id": "USN-5822-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5822-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5936-1/",
                    "reference_id": "USN-5936-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5936-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7582-1/",
                    "reference_id": "USN-7582-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7582-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77521?format=api",
                    "purl": "pkg:ebuild/net-fs/samba@4.18.4",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.18.4"
                }
            ],
            "aliases": [
                "CVE-2022-3437"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s2ne-rcp3-nbgz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48498?format=api",
            "vulnerability_id": "VCID-t3zy-v34p-7uen",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32746.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32746.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32746",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00302",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53475",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56688",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5666",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56638",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5669",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56694",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56703",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56678",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56657",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56687",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56659",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00368",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58741",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00368",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58811",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00368",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58757",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00368",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58713",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00368",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58688",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00368",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58703",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00368",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58687",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00368",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58655",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00368",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58699",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32746"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449",
                    "reference_id": "1016449",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108215",
                    "reference_id": "2108215",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108215"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2782",
                    "reference_id": "AVG-2782",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2782"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7730",
                    "reference_id": "RHSA-2022:7730",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7730"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8318",
                    "reference_id": "RHSA-2022:8318",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8318"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5542-1/",
                    "reference_id": "USN-5542-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5542-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77521?format=api",
                    "purl": "pkg:ebuild/net-fs/samba@4.18.4",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.18.4"
                }
            ],
            "aliases": [
                "CVE-2022-32746"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t3zy-v34p-7uen"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48480?format=api",
            "vulnerability_id": "VCID-tk1x-bex4-8kbz",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3738.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3738.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3738",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60905",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60825",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60809",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60797",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60811",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60803",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60754",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60801",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60859",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60821",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60847",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00402",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60831",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00402",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60711",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00402",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6085",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00402",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60873",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00402",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60784",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00402",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60813",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00402",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60777",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00402",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60826",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00402",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60842",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00402",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60863",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3738"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2021726",
                    "reference_id": "2021726",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2021726"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2538",
                    "reference_id": "AVG-2538",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2538"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5142-1/",
                    "reference_id": "USN-5142-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5142-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77521?format=api",
                    "purl": "pkg:ebuild/net-fs/samba@4.18.4",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.18.4"
                }
            ],
            "aliases": [
                "CVE-2021-3738"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tk1x-bex4-8kbz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48479?format=api",
            "vulnerability_id": "VCID-w4c6-p858-rkaw",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3670.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3670.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3670",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86903",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86874",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86885",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87472",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87467",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87464",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87478",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8748",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87494",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87501",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.03426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87513",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.03426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87528",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.03426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87546",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.03426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87541",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.03426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87555",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.03426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87587",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.03426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87435",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87453",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8746",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3670"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3670",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3670"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077533",
                    "reference_id": "2077533",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077533"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5542-1/",
                    "reference_id": "USN-5542-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5542-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77521?format=api",
                    "purl": "pkg:ebuild/net-fs/samba@4.18.4",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.18.4"
                }
            ],
            "aliases": [
                "CVE-2021-3670"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w4c6-p858-rkaw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48482?format=api",
            "vulnerability_id": "VCID-wxva-f9ay-c3a2",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20316.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20316.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72249",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72255",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72274",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7225",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72289",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72301",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72323",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72307",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72294",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72336",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72392",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72419",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72345",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72333",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72376",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72386",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72382",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72373",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72403",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7243",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00813",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74431",
                            "published_at": "2026-05-14T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20316"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20316"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004690",
                    "reference_id": "1004690",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004690"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2009673",
                    "reference_id": "2009673",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2009673"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1756",
                    "reference_id": "RHSA-2022:1756",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1756"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:2074",
                    "reference_id": "RHSA-2022:2074",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:2074"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77521?format=api",
                    "purl": "pkg:ebuild/net-fs/samba@4.18.4",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.18.4"
                }
            ],
            "aliases": [
                "CVE-2021-20316"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wxva-f9ay-c3a2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48500?format=api",
            "vulnerability_id": "VCID-xmn1-g72k-8qcq",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-37966.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-37966.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-37966",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80452",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.01378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80383",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80401",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.01378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80395",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.01378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80411",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.01378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80215",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80235",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80224",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80252",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80262",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8028",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80265",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80259",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80289",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80291",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80295",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80321",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80327",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80345",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8036",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-37966"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37966",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37966"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154303",
                    "reference_id": "2154303",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154303"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2828",
                    "reference_id": "AVG-2828",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Unknown",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2828"
                },
                {
                    "reference_url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37966",
                    "reference_id": "CVE-2022-37966",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T13:50:56Z/"
                        }
                    ],
                    "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37966"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5822-1/",
                    "reference_id": "USN-5822-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5822-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5936-1/",
                    "reference_id": "USN-5936-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5936-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77521?format=api",
                    "purl": "pkg:ebuild/net-fs/samba@4.18.4",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.18.4"
                }
            ],
            "aliases": [
                "CVE-2022-37966"
            ],
            "risk_score": 3.6,
            "exploitability": "0.5",
            "weighted_severity": "7.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xmn1-g72k-8qcq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48496?format=api",
            "vulnerability_id": "VCID-xwke-mduk-kyga",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32744.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32744.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32744",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62128",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6483",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64787",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6475",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64799",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64814",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64831",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6482",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64792",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64841",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64828",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00516",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66769",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00516",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66835",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00516",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66776",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00516",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66749",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00516",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66704",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00516",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66718",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00516",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66717",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00516",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66691",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00516",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66736",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32744"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449",
                    "reference_id": "1016449",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108205",
                    "reference_id": "2108205",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108205"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2782",
                    "reference_id": "AVG-2782",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2782"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5542-1/",
                    "reference_id": "USN-5542-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5542-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77521?format=api",
                    "purl": "pkg:ebuild/net-fs/samba@4.18.4",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.18.4"
                }
            ],
            "aliases": [
                "CVE-2022-32744"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xwke-mduk-kyga"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@4.18.4"
}