Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/83217?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/83217?format=api", "purl": "pkg:ebuild/net-fs/samba@3.6.25", "type": "ebuild", "namespace": "net-fs", "name": "samba", "version": "3.6.25", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "4.2.11", "latest_non_vulnerable_version": "4.18.9", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55627?format=api", "vulnerability_id": "VCID-3w4u-k81w-hued", "summary": "several", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4475.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4475.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4475", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06144", "scoring_system": "epss", "scoring_elements": "0.90769", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06144", "scoring_system": "epss", "scoring_elements": "0.90775", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06144", "scoring_system": "epss", "scoring_elements": "0.90786", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06144", "scoring_system": "epss", "scoring_elements": "0.90796", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06144", "scoring_system": "epss", "scoring_elements": "0.90807", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06144", "scoring_system": "epss", "scoring_elements": "0.90813", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06144", "scoring_system": "epss", "scoring_elements": "0.90822", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.06144", "scoring_system": "epss", "scoring_elements": "0.9082", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06144", "scoring_system": "epss", "scoring_elements": "0.90839", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.06144", "scoring_system": "epss", "scoring_elements": "0.90838", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.06902", "scoring_system": "epss", "scoring_elements": "0.91415", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.06902", "scoring_system": "epss", "scoring_elements": "0.91424", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.06902", "scoring_system": "epss", "scoring_elements": "0.91422", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.06902", "scoring_system": "epss", "scoring_elements": "0.91436", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.06902", "scoring_system": "epss", "scoring_elements": "0.91451", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.06902", "scoring_system": "epss", "scoring_elements": "0.91461", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.06902", "scoring_system": "epss", "scoring_elements": "0.91459", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.06902", "scoring_system": "epss", "scoring_elements": "0.91469", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.06902", "scoring_system": "epss", "scoring_elements": "0.91477", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4475" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4408", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4408" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4475", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4475" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1024542", "reference_id": "1024542", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1024542" }, { "reference_url": "https://security.gentoo.org/glsa/201502-15", "reference_id": "GLSA-201502-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201502-15" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1806", "reference_id": "RHSA-2013:1806", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1806" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0009", "reference_id": "RHSA-2014:0009", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0009" }, { "reference_url": "https://usn.ubuntu.com/2054-1/", "reference_id": "USN-2054-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2054-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83217?format=api", "purl": "pkg:ebuild/net-fs/samba@3.6.25", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@3.6.25" } ], "aliases": [ "CVE-2013-4475" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3w4u-k81w-hued" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56867?format=api", "vulnerability_id": "VCID-45rp-gyp5-ukfb", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which allowing a context-dependent attacker to bypass intended file\n restrictions, cause a Denial of Service or execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0240.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0240.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0240", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.89539", "scoring_system": "epss", "scoring_elements": "0.99551", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.89539", "scoring_system": "epss", "scoring_elements": "0.99552", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.89539", "scoring_system": "epss", "scoring_elements": "0.99553", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.89694", "scoring_system": "epss", "scoring_elements": "0.99567", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.89694", "scoring_system": "epss", "scoring_elements": "0.99568", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.89708", "scoring_system": "epss", "scoring_elements": "0.99565", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.90696", "scoring_system": "epss", "scoring_elements": "0.99631", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.90696", "scoring_system": "epss", "scoring_elements": "0.99625", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.90696", "scoring_system": "epss", "scoring_elements": "0.99627", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.90696", "scoring_system": "epss", "scoring_elements": "0.99628", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.90696", "scoring_system": "epss", "scoring_elements": "0.99629", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.90696", "scoring_system": "epss", "scoring_elements": "0.9963", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.91081", "scoring_system": "epss", "scoring_elements": "0.99646", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0240" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0240", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0240" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191325", "reference_id": "1191325", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191325" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779033", "reference_id": "779033", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779033" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86/dos/36741.py", "reference_id": "CVE-2015-0240;OSVDB-118637", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86/dos/36741.py" }, { "reference_url": "https://security.gentoo.org/glsa/201502-15", "reference_id": "GLSA-201502-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201502-15" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0249", "reference_id": "RHSA-2015:0249", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0249" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0250", "reference_id": "RHSA-2015:0250", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0250" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0251", "reference_id": "RHSA-2015:0251", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0251" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0252", "reference_id": "RHSA-2015:0252", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0252" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0253", "reference_id": "RHSA-2015:0253", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0253" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0254", "reference_id": "RHSA-2015:0254", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0254" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0255", "reference_id": "RHSA-2015:0255", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0255" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0256", "reference_id": "RHSA-2015:0256", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0256" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0257", "reference_id": "RHSA-2015:0257", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0257" }, { "reference_url": "https://usn.ubuntu.com/2508-1/", "reference_id": "USN-2508-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2508-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83217?format=api", "purl": "pkg:ebuild/net-fs/samba@3.6.25", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@3.6.25" } ], "aliases": [ "CVE-2015-0240" ], "risk_score": 1.6, "exploitability": "2.0", "weighted_severity": "0.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-45rp-gyp5-ukfb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56864?format=api", "vulnerability_id": "VCID-chw6-82ck-huhg", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which allowing a context-dependent attacker to bypass intended file\n restrictions, cause a Denial of Service or execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4476.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4476.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4476", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.4525", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45332", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45352", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45296", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45351", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45373", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45341", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45342", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45394", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45389", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45339", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45256", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45197", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45093", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45156", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45173", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45116", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.4514", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45216", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4476" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4476", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4476" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1024547", "reference_id": "1024547", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1024547" }, { "reference_url": "https://security.gentoo.org/glsa/201502-15", "reference_id": "GLSA-201502-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201502-15" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83217?format=api", "purl": "pkg:ebuild/net-fs/samba@3.6.25", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@3.6.25" } ], "aliases": [ "CVE-2013-4476" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-chw6-82ck-huhg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56863?format=api", "vulnerability_id": "VCID-cu61-u4g4-kka7", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which allowing a context-dependent attacker to bypass intended file\n restrictions, cause a Denial of Service or execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4124.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4124.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4124", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.83531", "scoring_system": "epss", "scoring_elements": "0.99274", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.83531", "scoring_system": "epss", "scoring_elements": "0.99275", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.83531", "scoring_system": "epss", "scoring_elements": "0.99278", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.83531", "scoring_system": "epss", "scoring_elements": "0.99281", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.83531", "scoring_system": "epss", "scoring_elements": "0.99282", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.83531", "scoring_system": "epss", "scoring_elements": "0.99283", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.83531", "scoring_system": "epss", "scoring_elements": "0.99284", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.83531", "scoring_system": "epss", "scoring_elements": "0.99285", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.83531", "scoring_system": "epss", "scoring_elements": "0.99286", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.83531", "scoring_system": "epss", "scoring_elements": "0.99287", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.83531", "scoring_system": "epss", "scoring_elements": "0.9929", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.83531", "scoring_system": "epss", "scoring_elements": "0.99291", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.83531", "scoring_system": "epss", "scoring_elements": "0.99292", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.83531", "scoring_system": "epss", "scoring_elements": "0.99294", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.83531", "scoring_system": "epss", "scoring_elements": "0.99296", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4124" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4124", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4124" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=984401", "reference_id": "984401", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=984401" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/27778.txt", "reference_id": "CVE-2013-4124;OSVDB-95969", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/27778.txt" }, { "reference_url": "https://security.gentoo.org/glsa/201502-15", "reference_id": "GLSA-201502-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201502-15" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1310", "reference_id": "RHSA-2013:1310", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1310" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1542", "reference_id": "RHSA-2013:1542", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1542" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1543", "reference_id": "RHSA-2013:1543", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1543" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0305", "reference_id": "RHSA-2014:0305", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0305" }, { "reference_url": "https://usn.ubuntu.com/1966-1/", "reference_id": "USN-1966-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1966-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83217?format=api", "purl": "pkg:ebuild/net-fs/samba@3.6.25", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@3.6.25" } ], "aliases": [ "CVE-2013-4124" ], "risk_score": 1.6, "exploitability": "2.0", "weighted_severity": "0.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cu61-u4g4-kka7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56022?format=api", "vulnerability_id": "VCID-jc62-j5kx-hqdc", "summary": "security update", "references": [ { "reference_url": "http://advisories.mageia.org/MGASA-2014-0279.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://advisories.mageia.org/MGASA-2014-0279.html" }, { "reference_url": "http://linux.oracle.com/errata/ELSA-2014-0866.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://linux.oracle.com/errata/ELSA-2014-0866.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-0866.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-0866.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0244.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0244.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0244", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.20011", "scoring_system": "epss", "scoring_elements": "0.95534", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.20011", "scoring_system": "epss", "scoring_elements": "0.95436", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.20011", "scoring_system": "epss", "scoring_elements": "0.95445", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.20011", "scoring_system": "epss", "scoring_elements": "0.95451", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.20011", "scoring_system": "epss", "scoring_elements": "0.95454", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.20011", "scoring_system": "epss", "scoring_elements": "0.9546", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.20011", "scoring_system": "epss", "scoring_elements": "0.95463", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.20011", "scoring_system": "epss", "scoring_elements": "0.95468", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.20011", "scoring_system": "epss", "scoring_elements": "0.95469", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.20011", "scoring_system": "epss", "scoring_elements": "0.95478", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.20011", "scoring_system": "epss", "scoring_elements": "0.95482", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.20011", "scoring_system": "epss", "scoring_elements": "0.95486", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.20011", "scoring_system": "epss", "scoring_elements": "0.95487", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.20011", "scoring_system": "epss", "scoring_elements": "0.95489", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.20011", "scoring_system": "epss", "scoring_elements": "0.95488", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.20011", "scoring_system": "epss", "scoring_elements": "0.95498", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.20011", "scoring_system": "epss", "scoring_elements": "0.95503", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.20011", "scoring_system": "epss", "scoring_elements": "0.9551", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.20011", "scoring_system": "epss", "scoring_elements": "0.95516", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.20011", "scoring_system": "epss", "scoring_elements": "0.9552", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0244" }, { "reference_url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_samba1", "reference_id": "", "reference_type": "", "scores": [], "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_samba1" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0178", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0178" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0244", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0244" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3493", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3493" }, { "reference_url": "http://secunia.com/advisories/59378", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59378" }, { "reference_url": "http://secunia.com/advisories/59407", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59407" }, { "reference_url": "http://secunia.com/advisories/59433", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59433" }, { "reference_url": "http://secunia.com/advisories/59579", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59579" }, { "reference_url": "http://secunia.com/advisories/59834", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59834" }, { "reference_url": "http://secunia.com/advisories/59848", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59848" }, { "reference_url": "http://secunia.com/advisories/59919", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59919" }, { "reference_url": "http://secunia.com/advisories/61218", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61218" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-201502-15.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:136", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:136" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:082", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:082" }, { "reference_url": "http://www.samba.org/samba/security/CVE-2014-0244", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.samba.org/samba/security/CVE-2014-0244" }, { "reference_url": "http://www.securityfocus.com/archive/1/532757/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/532757/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/68148", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/68148" }, { "reference_url": "http://www.securitytracker.com/id/1030455", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030455" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1097815", "reference_id": "1097815", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1097815" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0244", "reference_id": "CVE-2014-0244", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0244" }, { "reference_url": "https://security.gentoo.org/glsa/201502-15", "reference_id": "GLSA-201502-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201502-15" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0866", "reference_id": "RHSA-2014:0866", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0866" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0867", "reference_id": "RHSA-2014:0867", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0867" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1009", "reference_id": "RHSA-2014:1009", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1009" }, { "reference_url": "https://usn.ubuntu.com/2257-1/", "reference_id": "USN-2257-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2257-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83217?format=api", "purl": "pkg:ebuild/net-fs/samba@3.6.25", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@3.6.25" } ], "aliases": [ "CVE-2014-0244" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jc62-j5kx-hqdc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56865?format=api", "vulnerability_id": "VCID-jdu1-822a-rkbu", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which allowing a context-dependent attacker to bypass intended file\n restrictions, cause a Denial of Service or execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4496.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4496.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4496", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0555", "scoring_system": "epss", "scoring_elements": "0.90228", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0555", "scoring_system": "epss", "scoring_elements": "0.90231", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0555", "scoring_system": "epss", "scoring_elements": "0.90244", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0555", "scoring_system": "epss", "scoring_elements": "0.90248", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0555", "scoring_system": "epss", "scoring_elements": "0.90264", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0555", "scoring_system": "epss", "scoring_elements": "0.9027", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0555", "scoring_system": "epss", "scoring_elements": "0.90279", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0555", "scoring_system": "epss", "scoring_elements": "0.90278", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0555", "scoring_system": "epss", "scoring_elements": "0.90272", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0555", "scoring_system": "epss", "scoring_elements": "0.90289", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0555", "scoring_system": "epss", "scoring_elements": "0.90285", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0555", "scoring_system": "epss", "scoring_elements": "0.903", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0555", "scoring_system": "epss", "scoring_elements": "0.90299", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0555", "scoring_system": "epss", "scoring_elements": "0.90296", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0555", "scoring_system": "epss", "scoring_elements": "0.90308", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0555", "scoring_system": "epss", "scoring_elements": "0.90324", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0555", "scoring_system": "epss", "scoring_elements": "0.90335", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0555", "scoring_system": "epss", "scoring_elements": "0.90331", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0555", "scoring_system": "epss", "scoring_elements": "0.9034", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0555", "scoring_system": "epss", "scoring_elements": "0.90354", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4496" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4496", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4496" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1072792", "reference_id": "1072792", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1072792" }, { "reference_url": "https://security.gentoo.org/glsa/201502-15", "reference_id": "GLSA-201502-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201502-15" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0330", "reference_id": "RHSA-2014:0330", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0330" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0383", "reference_id": "RHSA-2014:0383", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0383" }, { "reference_url": "https://usn.ubuntu.com/2156-1/", "reference_id": "USN-2156-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2156-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83217?format=api", "purl": "pkg:ebuild/net-fs/samba@3.6.25", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@3.6.25" } ], "aliases": [ "CVE-2013-4496" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jdu1-822a-rkbu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56023?format=api", "vulnerability_id": "VCID-ky5x-ujtx-fbe6", "summary": "security update", "references": [ { "reference_url": "http://advisories.mageia.org/MGASA-2014-0279.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://advisories.mageia.org/MGASA-2014-0279.html" }, { "reference_url": "http://linux.oracle.com/errata/ELSA-2014-0866.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://linux.oracle.com/errata/ELSA-2014-0866.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-0866.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-0866.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3493.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3493.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3493", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02413", "scoring_system": "epss", "scoring_elements": "0.85258", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.02413", "scoring_system": "epss", "scoring_elements": "0.8503", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02413", "scoring_system": "epss", "scoring_elements": "0.85043", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02413", "scoring_system": "epss", "scoring_elements": "0.8506", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02413", "scoring_system": "epss", "scoring_elements": "0.85064", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02413", "scoring_system": "epss", "scoring_elements": "0.85086", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02413", "scoring_system": "epss", "scoring_elements": "0.85094", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02413", "scoring_system": "epss", "scoring_elements": "0.85109", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02413", "scoring_system": "epss", "scoring_elements": "0.85107", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02413", "scoring_system": "epss", "scoring_elements": "0.85104", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02413", "scoring_system": "epss", "scoring_elements": "0.85125", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02413", "scoring_system": "epss", "scoring_elements": "0.85128", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02413", "scoring_system": "epss", "scoring_elements": "0.85148", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02413", "scoring_system": "epss", "scoring_elements": "0.85157", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02413", "scoring_system": "epss", "scoring_elements": "0.85153", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02413", "scoring_system": "epss", "scoring_elements": "0.85168", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.02413", "scoring_system": "epss", "scoring_elements": "0.85193", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.02413", "scoring_system": "epss", "scoring_elements": "0.85213", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.02413", "scoring_system": "epss", "scoring_elements": "0.85208", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.02413", "scoring_system": "epss", "scoring_elements": "0.85222", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3493" }, { "reference_url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_samba1", "reference_id": "", "reference_type": "", "scores": [], "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_samba1" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0178", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0178" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0244", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0244" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3493", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3493" }, { "reference_url": "http://secunia.com/advisories/59378", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59378" }, { "reference_url": "http://secunia.com/advisories/59407", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59407" }, { "reference_url": "http://secunia.com/advisories/59433", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59433" }, { "reference_url": "http://secunia.com/advisories/59579", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59579" }, { "reference_url": "http://secunia.com/advisories/59834", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59834" }, { "reference_url": "http://secunia.com/advisories/59848", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59848" }, { "reference_url": "http://secunia.com/advisories/59919", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59919" }, { "reference_url": "http://secunia.com/advisories/61218", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61218" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-201502-15.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:136", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:136" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:082", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:082" }, { "reference_url": "http://www.samba.org/samba/security/CVE-2014-3493", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.samba.org/samba/security/CVE-2014-3493" }, { "reference_url": "http://www.securityfocus.com/archive/1/532757/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/532757/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/68150", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/68150" }, { "reference_url": "http://www.securitytracker.com/id/1030455", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030455" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1108748", "reference_id": "1108748", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1108748" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3493", "reference_id": "CVE-2014-3493", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:L/Au:S/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3493" }, { "reference_url": "https://security.gentoo.org/glsa/201502-15", "reference_id": "GLSA-201502-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201502-15" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0866", "reference_id": "RHSA-2014:0866", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0866" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0867", "reference_id": "RHSA-2014:0867", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0867" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1009", "reference_id": "RHSA-2014:1009", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1009" }, { "reference_url": "https://usn.ubuntu.com/2257-1/", "reference_id": "USN-2257-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2257-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83217?format=api", "purl": "pkg:ebuild/net-fs/samba@3.6.25", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@3.6.25" } ], "aliases": [ "CVE-2014-3493" ], "risk_score": 1.2, "exploitability": "0.5", "weighted_severity": "2.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ky5x-ujtx-fbe6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55625?format=api", "vulnerability_id": "VCID-m5m4-8jr4-f3dz", "summary": "several", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4408.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4408.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4408", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0295", "scoring_system": "epss", "scoring_elements": "0.86599", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.0295", "scoring_system": "epss", "scoring_elements": "0.86396", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0295", "scoring_system": "epss", "scoring_elements": "0.86406", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0295", "scoring_system": "epss", "scoring_elements": "0.86424", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0295", "scoring_system": "epss", "scoring_elements": "0.86426", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0295", "scoring_system": "epss", "scoring_elements": "0.86444", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0295", "scoring_system": "epss", "scoring_elements": "0.86454", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0295", "scoring_system": "epss", "scoring_elements": "0.86468", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0295", "scoring_system": "epss", "scoring_elements": "0.86467", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0295", "scoring_system": "epss", "scoring_elements": "0.86461", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0295", "scoring_system": "epss", "scoring_elements": "0.86476", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0295", "scoring_system": "epss", "scoring_elements": "0.86481", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0295", "scoring_system": "epss", "scoring_elements": "0.86474", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0295", "scoring_system": "epss", "scoring_elements": "0.86494", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0295", "scoring_system": "epss", "scoring_elements": "0.86503", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0295", "scoring_system": "epss", "scoring_elements": "0.86501", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0295", "scoring_system": "epss", "scoring_elements": "0.86521", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0295", "scoring_system": "epss", "scoring_elements": "0.8654", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0295", "scoring_system": "epss", "scoring_elements": "0.86558", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0295", "scoring_system": "epss", "scoring_elements": "0.86553", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0295", "scoring_system": "epss", "scoring_elements": "0.86566", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4408" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4408", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4408" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4475", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4475" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:H/Au:N/C:C/I:C/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018032", "reference_id": "1018032", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018032" }, { "reference_url": "https://security.gentoo.org/glsa/201502-15", "reference_id": "GLSA-201502-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201502-15" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1805", "reference_id": "RHSA-2013:1805", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1805" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1806", "reference_id": "RHSA-2013:1806", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1806" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0009", "reference_id": "RHSA-2014:0009", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0009" }, { "reference_url": "https://usn.ubuntu.com/2054-1/", "reference_id": "USN-2054-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2054-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83217?format=api", "purl": "pkg:ebuild/net-fs/samba@3.6.25", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@3.6.25" } ], "aliases": [ "CVE-2013-4408" ], "risk_score": 1.7, "exploitability": "0.5", "weighted_severity": "3.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m5m4-8jr4-f3dz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56862?format=api", "vulnerability_id": "VCID-tvka-n7p1-nbec", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which allowing a context-dependent attacker to bypass intended file\n restrictions, cause a Denial of Service or execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6150.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6150.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-6150", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31703", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31532", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31405", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31322", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31172", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31241", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31247", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31156", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31179", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.3125", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.33759", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.34016", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.34097", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.34128", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.33988", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.3403", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.34061", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.3406", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.34017", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.33993", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.34029", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-6150" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6150", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6150" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1036897", "reference_id": "1036897", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1036897" }, { "reference_url": "https://security.gentoo.org/glsa/201502-15", "reference_id": "GLSA-201502-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201502-15" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0330", "reference_id": "RHSA-2014:0330", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0330" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0383", "reference_id": "RHSA-2014:0383", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0383" }, { "reference_url": "https://usn.ubuntu.com/2054-1/", "reference_id": "USN-2054-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2054-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83217?format=api", "purl": "pkg:ebuild/net-fs/samba@3.6.25", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@3.6.25" } ], "aliases": [ "CVE-2012-6150" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tvka-n7p1-nbec" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56021?format=api", "vulnerability_id": "VCID-x3bk-7vqp-3qgy", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0178.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0178.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0178", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01917", "scoring_system": "epss", "scoring_elements": "0.83249", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01917", "scoring_system": "epss", "scoring_elements": "0.83266", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01917", "scoring_system": "epss", "scoring_elements": "0.8328", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01917", "scoring_system": "epss", "scoring_elements": "0.83304", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01917", "scoring_system": "epss", "scoring_elements": "0.83313", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01917", "scoring_system": "epss", "scoring_elements": "0.83328", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01917", "scoring_system": "epss", "scoring_elements": "0.83322", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01917", "scoring_system": "epss", "scoring_elements": "0.83318", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01917", "scoring_system": "epss", "scoring_elements": "0.83353", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01917", "scoring_system": "epss", "scoring_elements": "0.83354", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01917", "scoring_system": "epss", "scoring_elements": "0.83356", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01917", "scoring_system": "epss", "scoring_elements": "0.83379", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01917", "scoring_system": "epss", "scoring_elements": "0.83386", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02302", "scoring_system": "epss", "scoring_elements": "0.84798", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02302", "scoring_system": "epss", "scoring_elements": "0.84814", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.02302", "scoring_system": "epss", "scoring_elements": "0.8484", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.02302", "scoring_system": "epss", "scoring_elements": "0.84857", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.02302", "scoring_system": "epss", "scoring_elements": "0.84852", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.02302", "scoring_system": "epss", "scoring_elements": "0.84869", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.02302", "scoring_system": "epss", "scoring_elements": "0.84901", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0178" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0178", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0178" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0244", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0244" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3493", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3493" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1101992", "reference_id": "1101992", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1101992" }, { "reference_url": "https://security.gentoo.org/glsa/201502-15", "reference_id": "GLSA-201502-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201502-15" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0867", "reference_id": "RHSA-2014:0867", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0867" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1009", "reference_id": "RHSA-2014:1009", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1009" }, { "reference_url": "https://usn.ubuntu.com/2257-1/", "reference_id": "USN-2257-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2257-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83217?format=api", "purl": "pkg:ebuild/net-fs/samba@3.6.25", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@3.6.25" } ], "aliases": [ "CVE-2014-0178" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x3bk-7vqp-3qgy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56866?format=api", "vulnerability_id": "VCID-ycdc-vg8w-6kew", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which allowing a context-dependent attacker to bypass intended file\n restrictions, cause a Denial of Service or execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0239.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0239.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0239", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.22157", "scoring_system": "epss", "scoring_elements": "0.95761", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.22157", "scoring_system": "epss", "scoring_elements": "0.9577", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.22157", "scoring_system": "epss", "scoring_elements": "0.95777", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.22157", "scoring_system": "epss", "scoring_elements": "0.9578", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.22157", "scoring_system": "epss", "scoring_elements": "0.95788", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.22157", "scoring_system": "epss", "scoring_elements": "0.95792", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.22157", "scoring_system": "epss", "scoring_elements": "0.95795", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.22157", "scoring_system": "epss", "scoring_elements": "0.95797", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.22157", "scoring_system": "epss", "scoring_elements": "0.95807", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.22157", "scoring_system": "epss", "scoring_elements": "0.95812", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.22157", "scoring_system": "epss", "scoring_elements": "0.95813", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.22157", "scoring_system": "epss", "scoring_elements": "0.95816", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.22157", "scoring_system": "epss", "scoring_elements": "0.95827", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.22157", "scoring_system": "epss", "scoring_elements": "0.95829", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.22157", "scoring_system": "epss", "scoring_elements": "0.95835", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.22157", "scoring_system": "epss", "scoring_elements": "0.9584", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.22157", "scoring_system": "epss", "scoring_elements": "0.95844", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.22157", "scoring_system": "epss", "scoring_elements": "0.95857", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0239" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0239", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0239" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1101988", "reference_id": "1101988", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1101988" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=749845", "reference_id": "749845", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=749845" }, { "reference_url": "https://security.gentoo.org/glsa/201502-15", "reference_id": "GLSA-201502-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201502-15" }, { "reference_url": "https://usn.ubuntu.com/2257-1/", "reference_id": "USN-2257-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2257-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83217?format=api", "purl": "pkg:ebuild/net-fs/samba@3.6.25", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@3.6.25" } ], "aliases": [ "CVE-2014-0239" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ycdc-vg8w-6kew" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-fs/samba@3.6.25" }