Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/938990?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/938990?format=api", "purl": "pkg:deb/debian/samba@0?distro=trixie", "type": "deb", "namespace": "debian", "name": "samba", "version": "0", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "2.2.5", "latest_non_vulnerable_version": "2:4.24.2+dfsg-1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46963?format=api", "vulnerability_id": "VCID-4ag6-6svz-8qa3", "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which can lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3347.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3347.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3347", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.62017", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61822", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61859", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61906", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61967", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61949", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.62003", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61853", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61823", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61872", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61888", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61909", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61897", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61877", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.6192", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61925", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61908", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61904", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61922", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61914", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3347" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222792", "reference_id": "2222792", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T13:37:21Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222792" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:8::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb", "reference_id": "cpe:/a:redhat:enterprise_linux:8::crb", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb", "reference_id": "cpe:/a:redhat:enterprise_linux:9::crb", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::resilientstorage", "reference_id": "cpe:/a:redhat:enterprise_linux:9::resilientstorage", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::resilientstorage" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:storage:3", "reference_id": "cpe:/a:redhat:storage:3", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:storage:3" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7", "reference_id": "cpe:/o:redhat:enterprise_linux:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos", "reference_id": "cpe:/o:redhat:enterprise_linux:8::baseos", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos", "reference_id": "cpe:/o:redhat:enterprise_linux:9::baseos", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2023-3347", "reference_id": "CVE-2023-3347", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T13:37:21Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2023-3347" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2023-3347.html", "reference_id": "CVE-2023-3347.html", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T13:37:21Z/" } ], "url": "https://www.samba.org/samba/security/CVE-2023-3347.html" }, { "reference_url": "https://security.gentoo.org/glsa/202402-28", "reference_id": "GLSA-202402-28", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-28" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4325", "reference_id": "RHSA-2023:4325", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T13:37:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:4325" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4328", "reference_id": "RHSA-2023:4328", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T13:37:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:4328" }, { "reference_url": "https://usn.ubuntu.com/6238-1/", "reference_id": "USN-6238-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6238-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/938990?format=api", "purl": "pkg:deb/debian/samba@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938984?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939074?format=api", "purl": "pkg:deb/debian/samba@2:4.17.10%2Bdfsg-0%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.10%252Bdfsg-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938982?format=api", "purl": "pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939075?format=api", "purl": "pkg:deb/debian/samba@2:4.18.5%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.18.5%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938986?format=api", "purl": "pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938985?format=api", "purl": "pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067630?format=api", "purl": "pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1112581?format=api", "purl": "pkg:deb/debian/samba@2:4.24.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2023-3347" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4ag6-6svz-8qa3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82468?format=api", "vulnerability_id": "VCID-6are-8jqa-nqae", "summary": "samba: NULL pointer dereference in Samba LDAP server leading to crash and Dos", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12436.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12436.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-12436", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02439", "scoring_system": "epss", "scoring_elements": "0.85337", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.02439", "scoring_system": "epss", "scoring_elements": "0.85278", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.02439", "scoring_system": "epss", "scoring_elements": "0.85293", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.02439", "scoring_system": "epss", "scoring_elements": "0.85329", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.02439", "scoring_system": "epss", "scoring_elements": "0.85131", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02439", "scoring_system": "epss", "scoring_elements": "0.85134", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02439", "scoring_system": "epss", "scoring_elements": "0.85157", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02439", "scoring_system": "epss", "scoring_elements": "0.85164", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02439", "scoring_system": "epss", "scoring_elements": "0.85179", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02439", "scoring_system": "epss", "scoring_elements": "0.85176", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02439", "scoring_system": "epss", "scoring_elements": "0.85173", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02439", "scoring_system": "epss", "scoring_elements": "0.85194", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02439", "scoring_system": "epss", "scoring_elements": "0.85195", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02439", "scoring_system": "epss", "scoring_elements": "0.85218", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02439", "scoring_system": "epss", "scoring_elements": "0.85226", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02439", "scoring_system": "epss", "scoring_elements": "0.85224", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02439", "scoring_system": "epss", "scoring_elements": "0.85238", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.02439", "scoring_system": "epss", "scoring_elements": "0.85264", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.02439", "scoring_system": "epss", "scoring_elements": "0.85283", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.04233", "scoring_system": "epss", "scoring_elements": "0.88732", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04233", "scoring_system": "epss", "scoring_elements": "0.88723", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-12436" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1711837", "reference_id": "1711837", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1711837" }, { "reference_url": "https://usn.ubuntu.com/4018-1/", "reference_id": "USN-4018-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4018-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/938990?format=api", "purl": "pkg:deb/debian/samba@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938984?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938982?format=api", "purl": "pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938986?format=api", "purl": "pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938985?format=api", "purl": "pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067630?format=api", "purl": "pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1112581?format=api", "purl": "pkg:deb/debian/samba@2:4.24.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-12436" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6are-8jqa-nqae" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83861?format=api", "vulnerability_id": "VCID-7qr6-s8zs-7ygf", "summary": "samba: SMB2 connections don't keep encryption across DFS redirects (incomplete fix of CVE-2017-12151)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15086.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15086.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15086", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.48956", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.49057", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.48964", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.49038", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.48992", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.49019", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.48973", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.49027", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.49023", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.4904", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.49013", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.49064", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.4906", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.49028", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.49014", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.48979", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.48897", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.48961", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.48988", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.48935", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15086" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15086", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15086" }, { "reference_url": "http://www.securityfocus.com/bid/101555", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/101555" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1505785", "reference_id": "1505785", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1505785" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:gluster_storage:3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:gluster_storage:3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:gluster_storage:3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15086", "reference_id": "CVE-2017-15086", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:N" }, { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15086" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:3110", "reference_id": "RHSA-2017:3110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:3110" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/938990?format=api", "purl": "pkg:deb/debian/samba@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938984?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938982?format=api", "purl": "pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938986?format=api", "purl": "pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938985?format=api", "purl": "pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067630?format=api", "purl": "pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1112581?format=api", "purl": "pkg:deb/debian/samba@2:4.24.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-15086" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7qr6-s8zs-7ygf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48492?format=api", "vulnerability_id": "VCID-7rcm-14da-ybdv", "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3592.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3592.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3592", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00635", "scoring_system": "epss", "scoring_elements": "0.70398", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00635", "scoring_system": "epss", "scoring_elements": "0.70444", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00635", "scoring_system": "epss", "scoring_elements": "0.70424", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00635", "scoring_system": "epss", "scoring_elements": "0.70475", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00635", "scoring_system": "epss", "scoring_elements": "0.70484", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00635", "scoring_system": "epss", "scoring_elements": "0.70458", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00635", "scoring_system": "epss", "scoring_elements": "0.70497", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00635", "scoring_system": "epss", "scoring_elements": "0.70528", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00635", "scoring_system": "epss", "scoring_elements": "0.70523", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00635", "scoring_system": "epss", "scoring_elements": "0.70575", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00635", "scoring_system": "epss", "scoring_elements": "0.7036", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00635", "scoring_system": "epss", "scoring_elements": "0.70338", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00635", "scoring_system": "epss", "scoring_elements": "0.70384", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00635", "scoring_system": "epss", "scoring_elements": "0.70422", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00635", "scoring_system": "epss", "scoring_elements": "0.70407", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00635", "scoring_system": "epss", "scoring_elements": "0.70393", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00635", "scoring_system": "epss", "scoring_elements": "0.70435", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00676", "scoring_system": "epss", "scoring_elements": "0.71671", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00828", "scoring_system": "epss", "scoring_elements": "0.74463", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3592" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137776", "reference_id": "2137776", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T15:14:01Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137776" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2022-3592", "reference_id": "CVE-2022-3592", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T15:14:01Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2022-3592" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2022-3592.html", "reference_id": "CVE-2022-3592.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T15:14:01Z/" } ], "url": "https://www.samba.org/samba/security/CVE-2022-3592.html" }, { "reference_url": "https://security.gentoo.org/glsa/202309-06", "reference_id": "GLSA-202309-06", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T15:14:01Z/" } ], "url": "https://security.gentoo.org/glsa/202309-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/938990?format=api", "purl": "pkg:deb/debian/samba@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938984?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938982?format=api", "purl": "pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938986?format=api", "purl": "pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938985?format=api", "purl": "pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067630?format=api", "purl": "pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1112581?format=api", "purl": "pkg:deb/debian/samba@2:4.24.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-3592" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7rcm-14da-ybdv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83862?format=api", "vulnerability_id": "VCID-88cg-p9pf-fbad", "summary": "samba: Some code path don't enforce smb signing, when they should (incomplete fix of CVE-2017-12150)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15085.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15085.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15085", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.5122", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51375", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51289", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51364", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51272", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51297", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51256", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51312", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51308", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51352", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51331", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51317", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51359", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51367", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51347", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51294", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51301", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51262", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51208", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51258", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51261", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15085" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15085", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15085" }, { "reference_url": "http://www.securityfocus.com/bid/101554", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/101554" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1505787", "reference_id": "1505787", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1505787" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:gluster_storage:3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:gluster_storage:3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:gluster_storage:3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15085", "reference_id": "CVE-2017-15085", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" }, { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15085" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:3110", "reference_id": "RHSA-2017:3110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:3110" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/938990?format=api", "purl": "pkg:deb/debian/samba@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938984?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938982?format=api", "purl": "pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938986?format=api", "purl": "pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938985?format=api", "purl": "pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067630?format=api", "purl": "pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1112581?format=api", "purl": "pkg:deb/debian/samba@2:4.24.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-15085" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-88cg-p9pf-fbad" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83863?format=api", "vulnerability_id": "VCID-9pjy-1k8p-abh5", "summary": "samba: Server memory information leak over SMB1 (incomplete fix for CVE-2017-12163)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15087.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15087.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15087", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00326", "scoring_system": "epss", "scoring_elements": "0.55467", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00326", "scoring_system": "epss", "scoring_elements": "0.55659", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00326", "scoring_system": "epss", "scoring_elements": "0.55583", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00326", "scoring_system": "epss", "scoring_elements": "0.55644", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00326", "scoring_system": "epss", "scoring_elements": "0.55579", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00326", "scoring_system": "epss", "scoring_elements": "0.55603", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00326", "scoring_system": "epss", "scoring_elements": "0.55581", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00326", "scoring_system": "epss", "scoring_elements": "0.55633", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00326", "scoring_system": "epss", "scoring_elements": "0.55636", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00326", "scoring_system": "epss", "scoring_elements": "0.55645", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00326", "scoring_system": "epss", "scoring_elements": "0.55625", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00326", "scoring_system": "epss", "scoring_elements": "0.55607", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00326", "scoring_system": "epss", "scoring_elements": "0.55649", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00326", "scoring_system": "epss", "scoring_elements": "0.55628", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00326", "scoring_system": "epss", "scoring_elements": "0.55556", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00326", "scoring_system": "epss", "scoring_elements": "0.55573", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00326", "scoring_system": "epss", "scoring_elements": "0.55548", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00326", "scoring_system": "epss", "scoring_elements": "0.55494", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00326", "scoring_system": "epss", "scoring_elements": "0.55541", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00326", "scoring_system": "epss", "scoring_elements": "0.556", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00326", "scoring_system": "epss", "scoring_elements": "0.55557", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15087" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15087", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15087" }, { "reference_url": "http://www.securityfocus.com/bid/101556", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/101556" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1505788", "reference_id": "1505788", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1505788" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:gluster_storage:3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:gluster_storage:3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:gluster_storage:3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15087", "reference_id": "CVE-2017-15087", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15087" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:3110", "reference_id": "RHSA-2017:3110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:3110" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/938990?format=api", "purl": "pkg:deb/debian/samba@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938984?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938982?format=api", "purl": "pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938986?format=api", "purl": "pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938985?format=api", "purl": "pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067630?format=api", "purl": "pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1112581?format=api", "purl": "pkg:deb/debian/samba@2:4.24.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-15087" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9pjy-1k8p-abh5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/90458?format=api", "vulnerability_id": "VCID-a1wd-zc1z-47cr", "summary": "The Samba server on Apple Mac OS X 10.3.9 and 10.4.10, when Windows file sharing is enabled, does not enforce disk quotas after dropping privileges, which allows remote authenticated users to use disk space in excess of quota.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2407.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2407.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-2407", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02903", "scoring_system": "epss", "scoring_elements": "0.86294", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02903", "scoring_system": "epss", "scoring_elements": "0.86304", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02903", "scoring_system": "epss", "scoring_elements": "0.86322", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02903", "scoring_system": "epss", "scoring_elements": "0.86323", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02903", "scoring_system": "epss", "scoring_elements": "0.86341", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02903", "scoring_system": "epss", "scoring_elements": "0.86351", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02903", "scoring_system": "epss", "scoring_elements": "0.86365", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02903", "scoring_system": "epss", "scoring_elements": "0.86363", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02903", "scoring_system": "epss", "scoring_elements": "0.86358", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02903", "scoring_system": "epss", "scoring_elements": "0.86374", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02903", "scoring_system": "epss", "scoring_elements": "0.86379", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02903", "scoring_system": "epss", "scoring_elements": "0.86372", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02903", "scoring_system": "epss", "scoring_elements": "0.86392", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02903", "scoring_system": "epss", "scoring_elements": "0.86402", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02903", "scoring_system": "epss", "scoring_elements": "0.86398", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.06255", "scoring_system": "epss", "scoring_elements": "0.90962", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.06255", "scoring_system": "epss", "scoring_elements": "0.90978", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.06255", "scoring_system": "epss", "scoring_elements": "0.90992", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.06255", "scoring_system": "epss", "scoring_elements": "0.9099", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.06255", "scoring_system": "epss", "scoring_elements": "0.90999", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.06255", "scoring_system": "epss", "scoring_elements": "0.91009", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.06255", "scoring_system": "epss", "scoring_elements": "0.91015", "published_at": "2026-05-15T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-2407" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/938990?format=api", "purl": "pkg:deb/debian/samba@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938984?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938982?format=api", "purl": "pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938986?format=api", "purl": "pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938985?format=api", "purl": "pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067630?format=api", "purl": "pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1112581?format=api", "purl": "pkg:deb/debian/samba@2:4.24.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2007-2407" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a1wd-zc1z-47cr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46971?format=api", "vulnerability_id": "VCID-cszj-r962-3yd8", "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which can lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42670.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42670.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-42670", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59883", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59709", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59755", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59718", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59766", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59827", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59783", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59809", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59874", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59733", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59703", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59754", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59768", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59787", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59772", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59791", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59797", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59782", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59752", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.5977", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-42670" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241885", "reference_id": "2241885", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-29T14:14:50Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241885" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:storage:3", "reference_id": "cpe:/a:redhat:storage:3", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:storage:3" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7", "reference_id": "cpe:/o:redhat:enterprise_linux:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8", "reference_id": "cpe:/o:redhat:enterprise_linux:8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9", "reference_id": "cpe:/o:redhat:enterprise_linux:9", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2023-42670", "reference_id": "CVE-2023-42670", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-29T14:14:50Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2023-42670" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2023-42670.html", "reference_id": "CVE-2023-42670.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-29T14:14:50Z/" } ], "url": "https://www.samba.org/samba/security/CVE-2023-42670.html" }, { "reference_url": "https://security.gentoo.org/glsa/202402-28", "reference_id": "GLSA-202402-28", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-28" }, { "reference_url": "https://bugzilla.samba.org/show_bug.cgi?id=15473", "reference_id": "show_bug.cgi?id=15473", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-29T14:14:50Z/" } ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=15473" }, { "reference_url": "https://usn.ubuntu.com/6425-1/", "reference_id": "USN-6425-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6425-1/" }, { "reference_url": "https://usn.ubuntu.com/6425-3/", "reference_id": "USN-6425-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6425-3/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/938990?format=api", "purl": "pkg:deb/debian/samba@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938984?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939080?format=api", "purl": "pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938982?format=api", "purl": "pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939081?format=api", "purl": "pkg:deb/debian/samba@2:4.19.1%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.19.1%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938986?format=api", "purl": "pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938985?format=api", "purl": "pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067630?format=api", "purl": "pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1112581?format=api", "purl": "pkg:deb/debian/samba@2:4.24.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2023-42670" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cszj-r962-3yd8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86846?format=api", "vulnerability_id": "VCID-fwan-19ua-ufgj", "summary": "samba4: may provide authenticated users with write access to LDAP directory objects when used as an AD DC", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0172.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0172.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-0172", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00283", "scoring_system": "epss", "scoring_elements": "0.51697", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00283", "scoring_system": "epss", "scoring_elements": "0.51536", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00283", "scoring_system": "epss", "scoring_elements": "0.51588", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00283", "scoring_system": "epss", "scoring_elements": "0.51614", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00283", "scoring_system": "epss", "scoring_elements": "0.51574", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00283", "scoring_system": "epss", "scoring_elements": "0.51629", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00283", "scoring_system": "epss", "scoring_elements": "0.51625", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00283", "scoring_system": "epss", "scoring_elements": "0.51673", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00283", "scoring_system": "epss", "scoring_elements": "0.51651", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00283", "scoring_system": "epss", "scoring_elements": "0.51635", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00283", "scoring_system": "epss", "scoring_elements": "0.51676", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00283", "scoring_system": "epss", "scoring_elements": "0.51684", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00283", "scoring_system": "epss", "scoring_elements": "0.51664", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00283", "scoring_system": "epss", "scoring_elements": "0.51621", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00283", "scoring_system": "epss", "scoring_elements": "0.51581", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00283", "scoring_system": "epss", "scoring_elements": "0.51525", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00283", "scoring_system": "epss", "scoring_elements": "0.51575", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00283", "scoring_system": "epss", "scoring_elements": "0.51619", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00283", "scoring_system": "epss", "scoring_elements": "0.5158", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00283", "scoring_system": "epss", "scoring_elements": "0.51608", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00283", "scoring_system": "epss", "scoring_elements": "0.51689", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-0172" }, { "reference_url": "http://www.samba.org/samba/security/CVE-2013-0172", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.samba.org/samba/security/CVE-2013-0172" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=895631", "reference_id": "895631", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=895631" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0172", "reference_id": "CVE-2013-0172", "reference_type": "", "scores": [ { "value": "3.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:S/C:N/I:P/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0172" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/938990?format=api", "purl": "pkg:deb/debian/samba@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938984?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938982?format=api", "purl": "pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938986?format=api", "purl": "pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938985?format=api", "purl": "pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067630?format=api", "purl": "pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1112581?format=api", "purl": "pkg:deb/debian/samba@2:4.24.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2013-0172" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fwan-19ua-ufgj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46964?format=api", "vulnerability_id": "VCID-hry8-y29y-x3h2", "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which can lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3961.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3961.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3961", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01941", "scoring_system": "epss", "scoring_elements": "0.83375", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01941", "scoring_system": "epss", "scoring_elements": "0.8339", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01941", "scoring_system": "epss", "scoring_elements": "0.83389", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01941", "scoring_system": "epss", "scoring_elements": "0.83414", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01941", "scoring_system": "epss", "scoring_elements": "0.83424", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01941", "scoring_system": "epss", "scoring_elements": "0.83439", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01941", "scoring_system": "epss", "scoring_elements": "0.83433", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01941", "scoring_system": "epss", "scoring_elements": "0.83428", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01941", "scoring_system": "epss", "scoring_elements": "0.83464", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01941", "scoring_system": "epss", "scoring_elements": "0.83465", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01941", "scoring_system": "epss", "scoring_elements": "0.83488", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01941", "scoring_system": "epss", "scoring_elements": "0.83495", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01941", "scoring_system": "epss", "scoring_elements": "0.83497", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01941", "scoring_system": "epss", "scoring_elements": "0.83522", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01941", "scoring_system": "epss", "scoring_elements": "0.83543", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01941", "scoring_system": "epss", "scoring_elements": "0.83562", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01941", "scoring_system": "epss", "scoring_elements": "0.83563", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01941", "scoring_system": "epss", "scoring_elements": "0.83579", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01941", "scoring_system": "epss", "scoring_elements": "0.83616", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.01941", "scoring_system": "epss", "scoring_elements": "0.83626", "published_at": "2026-05-15T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3961" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241881", "reference_id": "2241881", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241881" }, { "reference_url": "https://security.gentoo.org/glsa/202402-28", "reference_id": "GLSA-202402-28", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-28" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6209", "reference_id": "RHSA-2023:6209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6744", "reference_id": "RHSA-2023:6744", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6744" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7371", "reference_id": "RHSA-2023:7371", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7371" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7408", "reference_id": "RHSA-2023:7408", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7408" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7464", "reference_id": "RHSA-2023:7464", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7464" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7467", "reference_id": "RHSA-2023:7467", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7467" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/938990?format=api", "purl": "pkg:deb/debian/samba@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938984?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939080?format=api", "purl": "pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938982?format=api", "purl": "pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939081?format=api", "purl": "pkg:deb/debian/samba@2:4.19.1%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.19.1%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938986?format=api", "purl": "pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938985?format=api", "purl": "pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067630?format=api", "purl": "pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1112581?format=api", "purl": "pkg:deb/debian/samba@2:4.24.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2023-3961" ], "risk_score": 4.1, "exploitability": "0.5", "weighted_severity": "8.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hry8-y29y-x3h2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/106417?format=api", "vulnerability_id": "VCID-kbtz-afsp-g3cj", "summary": "Stack-based buffer overflow in the reply_nttrans function in Samba 2.2.7a and earlier allows remote attackers to execute arbitrary code via a crafted request, a different vulnerability than CVE-2003-0201.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2003-1332", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06492", "scoring_system": "epss", "scoring_elements": "0.91047", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06492", "scoring_system": "epss", "scoring_elements": "0.91052", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06492", "scoring_system": "epss", "scoring_elements": "0.91061", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06492", "scoring_system": "epss", "scoring_elements": "0.9107", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06492", "scoring_system": "epss", "scoring_elements": "0.91082", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06492", "scoring_system": "epss", "scoring_elements": "0.91088", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06492", "scoring_system": "epss", "scoring_elements": "0.91097", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.06492", "scoring_system": "epss", "scoring_elements": "0.91098", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06492", "scoring_system": "epss", "scoring_elements": "0.91122", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.06492", "scoring_system": "epss", "scoring_elements": "0.91121", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.06492", "scoring_system": "epss", "scoring_elements": "0.91125", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.06492", "scoring_system": "epss", "scoring_elements": "0.91138", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.06492", "scoring_system": "epss", "scoring_elements": "0.91135", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.06492", "scoring_system": "epss", "scoring_elements": "0.9113", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.06492", "scoring_system": "epss", "scoring_elements": "0.91144", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.06492", "scoring_system": "epss", "scoring_elements": "0.91159", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.06492", "scoring_system": "epss", "scoring_elements": "0.91171", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.06492", "scoring_system": "epss", "scoring_elements": "0.9117", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.06492", "scoring_system": "epss", "scoring_elements": "0.91179", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.06492", "scoring_system": "epss", "scoring_elements": "0.9119", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.06492", "scoring_system": "epss", "scoring_elements": "0.91197", "published_at": "2026-05-15T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2003-1332" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/938990?format=api", "purl": "pkg:deb/debian/samba@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938984?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938982?format=api", "purl": "pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938986?format=api", "purl": "pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938985?format=api", "purl": "pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067630?format=api", "purl": "pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1112581?format=api", "purl": "pkg:deb/debian/samba@2:4.24.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2003-1332" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kbtz-afsp-g3cj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/90417?format=api", "vulnerability_id": "VCID-q4r4-cxcp-gfhq", "summary": "Buffer overflow in the nss_winbind.so.1 library in Samba 3.0.21 through 3.0.23d, as used in the winbindd daemon on Solaris, allows attackers to execute arbitrary code via the (1) gethostbyname and (2) getipnodebyname functions.", "references": [ { "reference_url": "http://osvdb.org/33098", "reference_id": "", "reference_type": "", "scores": [], "url": "http://osvdb.org/33098" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0453.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0453.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-0453", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00528", "scoring_system": "epss", "scoring_elements": "0.6733", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00528", "scoring_system": "epss", "scoring_elements": "0.67079", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00528", "scoring_system": "epss", "scoring_elements": "0.67116", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00528", "scoring_system": "epss", "scoring_elements": "0.67139", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00528", "scoring_system": "epss", "scoring_elements": "0.67114", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00528", "scoring_system": "epss", "scoring_elements": "0.67164", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00528", "scoring_system": "epss", "scoring_elements": "0.67176", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00528", "scoring_system": "epss", "scoring_elements": "0.67195", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00528", "scoring_system": "epss", "scoring_elements": "0.67182", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00528", "scoring_system": "epss", "scoring_elements": "0.67151", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00528", "scoring_system": "epss", "scoring_elements": "0.67185", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00528", "scoring_system": "epss", "scoring_elements": "0.67198", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00528", "scoring_system": "epss", "scoring_elements": "0.6718", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00528", "scoring_system": "epss", "scoring_elements": "0.672", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00528", "scoring_system": "epss", "scoring_elements": "0.67211", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00528", "scoring_system": "epss", "scoring_elements": "0.67222", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00528", "scoring_system": "epss", "scoring_elements": "0.67259", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00528", "scoring_system": "epss", "scoring_elements": "0.67232", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00528", "scoring_system": "epss", "scoring_elements": "0.67256", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00528", "scoring_system": "epss", "scoring_elements": "0.67318", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-0453" }, { "reference_url": "http://secunia.com/advisories/24043", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24043" }, { "reference_url": "http://secunia.com/advisories/24101", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24101" }, { "reference_url": "http://secunia.com/advisories/24151", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24151" }, { "reference_url": "http://securitytracker.com/id?1017589", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1017589" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32231", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32231" }, { "reference_url": "https://issues.rpath.com/browse/RPL-1005", "reference_id": "", "reference_type": "", "scores": [], "url": "https://issues.rpath.com/browse/RPL-1005" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.476916", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.476916" }, { "reference_url": "http://us1.samba.org/samba/security/CVE-2007-0453.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://us1.samba.org/samba/security/CVE-2007-0453.html" }, { "reference_url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/459168/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/459168/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/archive/1/459365/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/459365/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/22410", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/22410" }, { "reference_url": "http://www.trustix.org/errata/2007/0007", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.trustix.org/errata/2007/0007" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/0483", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/0483" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2007-0453", "reference_id": "CVE-2007-0453", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-0453" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/938990?format=api", "purl": "pkg:deb/debian/samba@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938984?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938982?format=api", "purl": "pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938986?format=api", "purl": "pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938985?format=api", "purl": "pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067630?format=api", "purl": "pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1112581?format=api", "purl": "pkg:deb/debian/samba@2:4.24.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2007-0453" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q4r4-cxcp-gfhq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78037?format=api", "vulnerability_id": "VCID-qv53-wyqw-7qh8", "summary": "samba: heap buffer overflow with freshness tokens in the Heimdal KDC", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5568.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5568.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5568", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06053", "scoring_system": "epss", "scoring_elements": "0.907", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06724", "scoring_system": "epss", "scoring_elements": "0.91363", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.06724", "scoring_system": "epss", "scoring_elements": "0.91311", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.06724", "scoring_system": "epss", "scoring_elements": "0.91328", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.06724", "scoring_system": "epss", "scoring_elements": "0.91338", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.06724", "scoring_system": "epss", "scoring_elements": "0.91336", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.06724", "scoring_system": "epss", "scoring_elements": "0.91346", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.06724", "scoring_system": "epss", "scoring_elements": "0.91357", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.06724", "scoring_system": "epss", "scoring_elements": "0.91226", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06724", "scoring_system": "epss", "scoring_elements": "0.91233", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06724", "scoring_system": "epss", "scoring_elements": "0.91246", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06724", "scoring_system": "epss", "scoring_elements": "0.91252", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06724", "scoring_system": "epss", "scoring_elements": "0.91259", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.06724", "scoring_system": "epss", "scoring_elements": "0.91262", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06724", "scoring_system": "epss", "scoring_elements": "0.91287", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.06724", "scoring_system": "epss", "scoring_elements": "0.91286", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.06724", "scoring_system": "epss", "scoring_elements": "0.91288", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.06724", "scoring_system": "epss", "scoring_elements": "0.91298", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.06724", "scoring_system": "epss", "scoring_elements": "0.91297", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5568" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2245174", "reference_id": "2245174", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-29T19:44:09Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2245174" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:storage:3", "reference_id": "cpe:/a:redhat:storage:3", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:storage:3" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7", "reference_id": "cpe:/o:redhat:enterprise_linux:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8", "reference_id": "cpe:/o:redhat:enterprise_linux:8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9", "reference_id": "cpe:/o:redhat:enterprise_linux:9", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2023-5568", "reference_id": "CVE-2023-5568", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-29T19:44:09Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2023-5568" }, { "reference_url": "https://www.samba.org/samba/history/samba-4.19.2.html", "reference_id": "samba-4.19.2.html", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-29T19:44:09Z/" } ], "url": "https://www.samba.org/samba/history/samba-4.19.2.html" }, { "reference_url": "https://bugzilla.samba.org/show_bug.cgi?id=15491", "reference_id": "show_bug.cgi?id=15491", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-29T19:44:09Z/" } ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=15491" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/938990?format=api", "purl": "pkg:deb/debian/samba@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938984?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938982?format=api", "purl": "pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939082?format=api", "purl": "pkg:deb/debian/samba@2:4.19.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.19.2%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938986?format=api", "purl": "pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938985?format=api", "purl": "pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067630?format=api", "purl": "pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1112581?format=api", "purl": "pkg:deb/debian/samba@2:4.24.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2023-5568" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qv53-wyqw-7qh8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/75402?format=api", "vulnerability_id": "VCID-zj82-mcs7-sbej", "summary": "samba: smbd doesn't pick up group membership changes when re-authenticating an expired SMB session", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0620.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0620.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-0620", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48255", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48243", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48225", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48237", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48184", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48101", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48166", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48191", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48135", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48165", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48238", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00576", "scoring_system": "epss", "scoring_elements": "0.68813", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00576", "scoring_system": "epss", "scoring_elements": "0.68799", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00576", "scoring_system": "epss", "scoring_elements": "0.6877", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00576", "scoring_system": "epss", "scoring_elements": "0.68811", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00576", "scoring_system": "epss", "scoring_elements": "0.68822", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00576", "scoring_system": "epss", "scoring_elements": "0.68722", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00576", "scoring_system": "epss", "scoring_elements": "0.68742", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00576", "scoring_system": "epss", "scoring_elements": "0.6872", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00576", "scoring_system": "epss", "scoring_elements": "0.68771", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00576", "scoring_system": "epss", "scoring_elements": "0.68791", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-0620" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107248", "reference_id": "1107248", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107248" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2370453", "reference_id": "2370453", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T20:43:04Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2370453" }, { "reference_url": "https://security.archlinux.org/ASA-202506-3", "reference_id": "ASA-202506-3", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202506-3" }, { "reference_url": "https://security.archlinux.org/AVG-2892", "reference_id": "AVG-2892", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2892" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4", "reference_id": "cpe:/a:redhat:openshift:4", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10", "reference_id": "cpe:/o:redhat:enterprise_linux:10", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7", "reference_id": "cpe:/o:redhat:enterprise_linux:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8", "reference_id": "cpe:/o:redhat:enterprise_linux:8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9", "reference_id": "cpe:/o:redhat:enterprise_linux:9", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2025-0620", "reference_id": "CVE-2025-0620", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T20:43:04Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2025-0620" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2025-0620.html", "reference_id": "CVE-2025-0620.html", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T20:43:04Z/" } ], "url": "https://www.samba.org/samba/security/CVE-2025-0620.html" }, { "reference_url": "https://usn.ubuntu.com/7564-1/", "reference_id": "USN-7564-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7564-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/938990?format=api", "purl": "pkg:deb/debian/samba@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938984?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938982?format=api", "purl": "pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939083?format=api", "purl": "pkg:deb/debian/samba@2:4.22.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.2%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938986?format=api", "purl": "pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938985?format=api", "purl": "pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067630?format=api", "purl": "pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1112581?format=api", "purl": "pkg:deb/debian/samba@2:4.24.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2025-0620" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zj82-mcs7-sbej" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@0%3Fdistro=trixie" }