Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/939034?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/939034?format=api", "purl": "pkg:deb/debian/samba@2:4.1.22%2Bdfsg-1?distro=trixie", "type": "deb", "namespace": "debian", "name": "samba", "version": "2:4.1.22+dfsg-1", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "2:4.3.6+dfsg-1", "latest_non_vulnerable_version": "2:4.24.1+dfsg-1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50090?format=api", "vulnerability_id": "VCID-7xaa-6397-eyby", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which may allow execution of arbitrary code with root privileges.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174076.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174076.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174391.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174391.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3223.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3223.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3223", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.20255", "scoring_system": "epss", "scoring_elements": "0.95563", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.20255", "scoring_system": "epss", "scoring_elements": "0.95553", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.20255", "scoring_system": "epss", "scoring_elements": "0.95559", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.20255", "scoring_system": "epss", "scoring_elements": "0.95475", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.20255", "scoring_system": "epss", "scoring_elements": "0.95485", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.20255", "scoring_system": "epss", "scoring_elements": "0.95491", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.20255", "scoring_system": "epss", "scoring_elements": "0.95496", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.20255", "scoring_system": "epss", "scoring_elements": "0.95502", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.20255", "scoring_system": "epss", "scoring_elements": "0.95505", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.20255", "scoring_system": "epss", "scoring_elements": "0.95509", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.20255", "scoring_system": "epss", "scoring_elements": "0.95511", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.20255", "scoring_system": "epss", "scoring_elements": "0.95512", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.20255", "scoring_system": "epss", "scoring_elements": "0.9552", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.20255", "scoring_system": "epss", "scoring_elements": "0.95525", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.20255", "scoring_system": "epss", "scoring_elements": "0.95527", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.20255", "scoring_system": "epss", "scoring_elements": "0.95528", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.20255", "scoring_system": "epss", "scoring_elements": "0.95529", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.20255", "scoring_system": "epss", "scoring_elements": "0.9553", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.20255", "scoring_system": "epss", "scoring_elements": "0.95543", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.20255", "scoring_system": "epss", "scoring_elements": "0.95546", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3223" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3223" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5252", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5252" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5299", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5330", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5330" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7540" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8467", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8467" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=aa6c27148b9d3f8c1e4fdd5dd46bfecbbd0ca465", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=aa6c27148b9d3f8c1e4fdd5dd46bfecbbd0ca465" }, { "reference_url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=ec504dbf69636a554add1f3d5703dd6c3ad450b8", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=ec504dbf69636a554add1f3d5703dd6c3ad450b8" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2015-3223.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.samba.org/samba/security/CVE-2015-3223.html" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3433", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3433" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" }, { "reference_url": "http://www.securityfocus.com/bid/79731", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/79731" }, { "reference_url": "http://www.securitytracker.com/id/1034493", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034493" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2855-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2855-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2855-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2855-2" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2856-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2856-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1290287", "reference_id": "1290287", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1290287" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3223", "reference_id": "CVE-2015-3223", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3223" }, { "reference_url": "https://security.gentoo.org/glsa/201612-47", "reference_id": "GLSA-201612-47", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201612-47" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0009", "reference_id": "RHSA-2016:0009", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0009" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0014", "reference_id": "RHSA-2016:0014", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0014" }, { "reference_url": "https://usn.ubuntu.com/2855-1/", "reference_id": "USN-2855-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2855-1/" }, { "reference_url": "https://usn.ubuntu.com/2856-1/", "reference_id": "USN-2856-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2856-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1112581?format=api", "purl": "pkg:deb/debian/samba@2:4.24.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.2%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939034?format=api", "purl": "pkg:deb/debian/samba@2:4.1.22%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.1.22%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938984?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938982?format=api", "purl": "pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938986?format=api", "purl": "pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938985?format=api", "purl": "pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067630?format=api", "purl": "pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2015-3223" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7xaa-6397-eyby" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50096?format=api", "vulnerability_id": "VCID-c9k2-wjf4-gbg6", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which may allow execution of arbitrary code with root privileges.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8467.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8467.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8467", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01749", "scoring_system": "epss", "scoring_elements": "0.82701", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01749", "scoring_system": "epss", "scoring_elements": "0.82686", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01749", "scoring_system": "epss", "scoring_elements": "0.82476", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01749", "scoring_system": "epss", "scoring_elements": "0.8249", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01749", "scoring_system": "epss", "scoring_elements": "0.82508", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01749", "scoring_system": "epss", "scoring_elements": "0.82505", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01749", "scoring_system": "epss", "scoring_elements": "0.82531", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01749", "scoring_system": "epss", "scoring_elements": "0.82538", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01749", "scoring_system": "epss", "scoring_elements": "0.82557", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01749", "scoring_system": "epss", "scoring_elements": "0.82552", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01749", "scoring_system": "epss", "scoring_elements": "0.82547", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01749", "scoring_system": "epss", "scoring_elements": "0.82584", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01749", "scoring_system": "epss", "scoring_elements": "0.82588", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01749", "scoring_system": "epss", "scoring_elements": "0.82609", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01749", "scoring_system": "epss", "scoring_elements": "0.8262", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01749", "scoring_system": "epss", "scoring_elements": "0.82626", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01749", "scoring_system": "epss", "scoring_elements": "0.82645", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01749", "scoring_system": "epss", "scoring_elements": "0.82667", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01749", "scoring_system": "epss", "scoring_elements": "0.82687", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8467" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3223" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5252", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5252" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5299", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5330", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5330" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7540" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8467", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8467" }, { "reference_url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=b000da128b5fb519d2d3f2e7fd20e4a25b7dae7d", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=b000da128b5fb519d2d3f2e7fd20e4a25b7dae7d" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2015-8467.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.samba.org/samba/security/CVE-2015-8467.html" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3433", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3433" }, { "reference_url": "http://www.securityfocus.com/bid/79735", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/79735" }, { "reference_url": "http://www.securitytracker.com/id/1034493", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034493" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2855-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2855-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2855-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2855-2" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1290294", "reference_id": "1290294", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1290294" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8467", "reference_id": "CVE-2015-8467", "reference_type": "", "scores": [ { "value": "6.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:S/C:P/I:P/A:P" }, { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8467" }, { "reference_url": "https://security.gentoo.org/glsa/201612-47", "reference_id": "GLSA-201612-47", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201612-47" }, { "reference_url": "https://usn.ubuntu.com/2855-1/", "reference_id": "USN-2855-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2855-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1112581?format=api", "purl": "pkg:deb/debian/samba@2:4.24.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.2%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939034?format=api", "purl": "pkg:deb/debian/samba@2:4.1.22%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.1.22%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938984?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938982?format=api", "purl": "pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938986?format=api", "purl": "pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938985?format=api", "purl": "pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067630?format=api", "purl": "pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2015-8467" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c9k2-wjf4-gbg6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50091?format=api", "vulnerability_id": "VCID-esjb-wmzz-fuc7", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which may allow execution of arbitrary code with root privileges.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174076.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174076.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174391.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174391.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00002.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00046.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00046.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5252.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5252.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5252", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.17333", "scoring_system": "epss", "scoring_elements": "0.95099", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.17333", "scoring_system": "epss", "scoring_elements": "0.95089", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.17333", "scoring_system": "epss", "scoring_elements": "0.95094", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.17333", "scoring_system": "epss", "scoring_elements": "0.95013", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.17333", "scoring_system": "epss", "scoring_elements": "0.95024", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.17333", "scoring_system": "epss", "scoring_elements": "0.95025", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.17333", "scoring_system": "epss", "scoring_elements": "0.95027", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.17333", "scoring_system": "epss", "scoring_elements": "0.95035", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.17333", "scoring_system": "epss", "scoring_elements": "0.95039", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.17333", "scoring_system": "epss", "scoring_elements": "0.95044", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.17333", "scoring_system": "epss", "scoring_elements": "0.95046", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.17333", "scoring_system": "epss", "scoring_elements": "0.95048", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.17333", "scoring_system": "epss", "scoring_elements": "0.95058", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.17333", "scoring_system": "epss", "scoring_elements": "0.9506", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.17333", "scoring_system": "epss", "scoring_elements": "0.95062", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.17333", "scoring_system": "epss", "scoring_elements": "0.95061", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.17333", "scoring_system": "epss", "scoring_elements": "0.95063", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.17333", "scoring_system": "epss", "scoring_elements": "0.95073", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.17333", "scoring_system": "epss", "scoring_elements": "0.95079", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5252" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3223" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5252", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5252" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5299", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5330", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5330" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7540" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8467", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8467" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:C/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=4278ef25f64d5fdbf432ff1534e275416ec9561e", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=4278ef25f64d5fdbf432ff1534e275416ec9561e" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2015-5252.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.samba.org/samba/security/CVE-2015-5252.html" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3433", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3433" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" }, { "reference_url": "http://www.securityfocus.com/bid/79733", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/79733" }, { "reference_url": "http://www.securitytracker.com/id/1034493", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034493" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2855-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2855-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2855-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2855-2" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1290288", "reference_id": "1290288", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1290288" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5252", "reference_id": "CVE-2015-5252", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N" }, { "value": "7.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5252" }, { "reference_url": "https://security.gentoo.org/glsa/201612-47", "reference_id": "GLSA-201612-47", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201612-47" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0006", "reference_id": "RHSA-2016:0006", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0006" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0010", "reference_id": "RHSA-2016:0010", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0010" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0011", "reference_id": "RHSA-2016:0011", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0011" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0015", "reference_id": "RHSA-2016:0015", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0015" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0016", "reference_id": "RHSA-2016:0016", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0016" }, { "reference_url": "https://usn.ubuntu.com/2855-1/", "reference_id": "USN-2855-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2855-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1112581?format=api", "purl": "pkg:deb/debian/samba@2:4.24.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.2%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939034?format=api", "purl": "pkg:deb/debian/samba@2:4.1.22%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.1.22%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938984?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938982?format=api", "purl": "pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938986?format=api", "purl": "pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938985?format=api", "purl": "pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067630?format=api", "purl": "pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2015-5252" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-esjb-wmzz-fuc7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50092?format=api", "vulnerability_id": "VCID-kkgp-9x4z-gue3", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which may allow execution of arbitrary code with root privileges.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174076.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174076.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174391.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174391.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00002.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5296.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5296.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5296", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03652", "scoring_system": "epss", "scoring_elements": "0.87955", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.03652", "scoring_system": "epss", "scoring_elements": "0.87946", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.03652", "scoring_system": "epss", "scoring_elements": "0.87943", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.03652", "scoring_system": "epss", "scoring_elements": "0.87815", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03652", "scoring_system": "epss", "scoring_elements": "0.87825", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03652", "scoring_system": "epss", "scoring_elements": "0.87836", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03652", "scoring_system": "epss", "scoring_elements": "0.87839", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03652", "scoring_system": "epss", "scoring_elements": "0.87861", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03652", "scoring_system": "epss", "scoring_elements": "0.87868", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03652", "scoring_system": "epss", "scoring_elements": "0.87879", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03652", "scoring_system": "epss", "scoring_elements": "0.87872", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03652", "scoring_system": "epss", "scoring_elements": "0.87871", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03652", "scoring_system": "epss", "scoring_elements": "0.87886", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03652", "scoring_system": "epss", "scoring_elements": "0.87884", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03652", "scoring_system": "epss", "scoring_elements": "0.87883", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03652", "scoring_system": "epss", "scoring_elements": "0.87899", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03652", "scoring_system": "epss", "scoring_elements": "0.87905", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.03652", "scoring_system": "epss", "scoring_elements": "0.87903", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.03652", "scoring_system": "epss", "scoring_elements": "0.87915", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.03652", "scoring_system": "epss", "scoring_elements": "0.8793", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3223" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5252", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5252" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5299", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5330", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5330" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7540" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8467", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8467" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.2", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:H/Au:N/C:P/I:P/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=1ba49b8f389eda3414b14410c7fbcb4041ca06b1", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=1ba49b8f389eda3414b14410c7fbcb4041ca06b1" }, { "reference_url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=a819d2b440aafa3138d95ff6e8b824da885a70e9", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=a819d2b440aafa3138d95ff6e8b824da885a70e9" }, { "reference_url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=d724f835acb9f4886c0001af32cd325dbbf1f895", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=d724f835acb9f4886c0001af32cd325dbbf1f895" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2015-5296.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.samba.org/samba/security/CVE-2015-5296.html" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3433", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3433" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" }, { "reference_url": "http://www.securityfocus.com/bid/79732", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/79732" }, { "reference_url": "http://www.securitytracker.com/id/1034493", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034493" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2855-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2855-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2855-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2855-2" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1290292", "reference_id": "1290292", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1290292" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5296", "reference_id": "CVE-2015-5296", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" }, { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5296" }, { "reference_url": "https://security.gentoo.org/glsa/201612-47", "reference_id": "GLSA-201612-47", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201612-47" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0006", "reference_id": "RHSA-2016:0006", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0006" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0010", "reference_id": "RHSA-2016:0010", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0010" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0011", "reference_id": "RHSA-2016:0011", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0011" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0015", "reference_id": "RHSA-2016:0015", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0015" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0016", "reference_id": "RHSA-2016:0016", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0016" }, { "reference_url": "https://usn.ubuntu.com/2855-1/", "reference_id": "USN-2855-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2855-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1112581?format=api", "purl": "pkg:deb/debian/samba@2:4.24.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.2%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939034?format=api", "purl": "pkg:deb/debian/samba@2:4.1.22%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.1.22%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938984?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938982?format=api", "purl": "pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938986?format=api", "purl": "pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938985?format=api", "purl": "pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067630?format=api", "purl": "pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2015-5296" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "4.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kkgp-9x4z-gue3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50093?format=api", "vulnerability_id": "VCID-q3qf-qtjv-cyat", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which may allow execution of arbitrary code with root privileges.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174076.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174076.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174391.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174391.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00002.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5299.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5299.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5299", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.09138", "scoring_system": "epss", "scoring_elements": "0.92737", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.09138", "scoring_system": "epss", "scoring_elements": "0.92727", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.09138", "scoring_system": "epss", "scoring_elements": "0.92731", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.09138", "scoring_system": "epss", "scoring_elements": "0.92646", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.09138", "scoring_system": "epss", "scoring_elements": "0.92652", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.09138", "scoring_system": "epss", "scoring_elements": "0.92658", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.09138", "scoring_system": "epss", "scoring_elements": "0.92668", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.09138", "scoring_system": "epss", "scoring_elements": "0.92673", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.09138", "scoring_system": "epss", "scoring_elements": "0.92679", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.09138", "scoring_system": "epss", "scoring_elements": "0.92678", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.09138", "scoring_system": "epss", "scoring_elements": "0.92692", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.09138", "scoring_system": "epss", "scoring_elements": "0.92696", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.09138", "scoring_system": "epss", "scoring_elements": "0.92699", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.09138", "scoring_system": "epss", "scoring_elements": "0.92694", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.09138", "scoring_system": "epss", "scoring_elements": "0.92703", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.09138", "scoring_system": "epss", "scoring_elements": "0.92716", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3223" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5252", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5252" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5299", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5330", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5330" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7540" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8467", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8467" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:S/C:P/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=675fd8d771f9d43e354dba53ddd9b5483ae0a1d7", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=675fd8d771f9d43e354dba53ddd9b5483ae0a1d7" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2015-5299.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.samba.org/samba/security/CVE-2015-5299.html" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3433", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3433" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" }, { "reference_url": "http://www.securityfocus.com/bid/79729", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/79729" }, { "reference_url": "http://www.securitytracker.com/id/1034493", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034493" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2855-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2855-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2855-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2855-2" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1276126", "reference_id": "1276126", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1276126" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5299", "reference_id": "CVE-2015-5299", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5299" }, { "reference_url": "https://security.gentoo.org/glsa/201612-47", "reference_id": "GLSA-201612-47", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201612-47" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0006", "reference_id": "RHSA-2016:0006", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0006" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0010", "reference_id": "RHSA-2016:0010", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0010" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0011", "reference_id": "RHSA-2016:0011", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0011" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0015", "reference_id": "RHSA-2016:0015", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0015" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0016", "reference_id": "RHSA-2016:0016", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0016" }, { "reference_url": "https://usn.ubuntu.com/2855-1/", "reference_id": "USN-2855-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2855-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1112581?format=api", "purl": "pkg:deb/debian/samba@2:4.24.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.2%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939034?format=api", "purl": "pkg:deb/debian/samba@2:4.1.22%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.1.22%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938984?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938982?format=api", "purl": "pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938986?format=api", "purl": "pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938985?format=api", "purl": "pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067630?format=api", "purl": "pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2015-5299" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q3qf-qtjv-cyat" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50095?format=api", "vulnerability_id": "VCID-r6dg-tbre-5fer", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which may allow execution of arbitrary code with root privileges.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174076.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174076.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174391.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174391.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7540.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7540.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7540", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.43299", "scoring_system": "epss", "scoring_elements": "0.97534", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.43299", "scoring_system": "epss", "scoring_elements": "0.97529", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.43299", "scoring_system": "epss", "scoring_elements": "0.97478", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.43299", "scoring_system": "epss", "scoring_elements": "0.97485", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.43299", "scoring_system": "epss", "scoring_elements": "0.97489", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.43299", "scoring_system": "epss", "scoring_elements": "0.97495", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.43299", "scoring_system": "epss", "scoring_elements": "0.97496", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.43299", "scoring_system": "epss", "scoring_elements": "0.975", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.43299", "scoring_system": "epss", "scoring_elements": "0.97502", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.43299", "scoring_system": "epss", "scoring_elements": "0.97503", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.43299", "scoring_system": "epss", "scoring_elements": "0.97511", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.43299", "scoring_system": "epss", "scoring_elements": "0.97512", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.43299", "scoring_system": "epss", "scoring_elements": "0.97513", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.43299", "scoring_system": "epss", "scoring_elements": "0.97515", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.43299", "scoring_system": "epss", "scoring_elements": "0.9752", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.43299", "scoring_system": "epss", "scoring_elements": "0.97524", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.43299", "scoring_system": "epss", "scoring_elements": "0.97526", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7540" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3223" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5252", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5252" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5299", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5330", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5330" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7540" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8467", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8467" }, { "reference_url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=530d50a1abdcdf4d1775652d4c456c1274d83d8d", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=530d50a1abdcdf4d1775652d4c456c1274d83d8d" }, { "reference_url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=9d989c9dd7a5b92d0c5d65287935471b83b6e884", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=9d989c9dd7a5b92d0c5d65287935471b83b6e884" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2015-7540.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.samba.org/samba/security/CVE-2015-7540.html" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3433", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3433" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" }, { "reference_url": "http://www.securityfocus.com/bid/79736", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/79736" }, { "reference_url": "http://www.securitytracker.com/id/1034492", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034492" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2855-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2855-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2855-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2855-2" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1288451", "reference_id": "1288451", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1288451" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7540", "reference_id": "CVE-2015-7540", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7540" }, { "reference_url": "https://security.gentoo.org/glsa/201612-47", "reference_id": "GLSA-201612-47", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201612-47" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0010", "reference_id": "RHSA-2016:0010", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0010" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0015", "reference_id": "RHSA-2016:0015", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0015" }, { "reference_url": "https://usn.ubuntu.com/2855-1/", "reference_id": "USN-2855-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2855-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1112581?format=api", "purl": "pkg:deb/debian/samba@2:4.24.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.2%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939034?format=api", "purl": "pkg:deb/debian/samba@2:4.1.22%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.1.22%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938984?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938982?format=api", "purl": "pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938986?format=api", "purl": "pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938985?format=api", "purl": "pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067630?format=api", "purl": "pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2015-7540" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r6dg-tbre-5fer" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50094?format=api", "vulnerability_id": "VCID-vjmz-bp2f-bbc1", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which may allow execution of arbitrary code with root privileges.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00002.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5330.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5330.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5330", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01625", "scoring_system": "epss", "scoring_elements": "0.8201", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01625", "scoring_system": "epss", "scoring_elements": "0.81996", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01625", "scoring_system": "epss", "scoring_elements": "0.81993", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01625", "scoring_system": "epss", "scoring_elements": "0.81789", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01625", "scoring_system": "epss", "scoring_elements": "0.818", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01625", "scoring_system": "epss", "scoring_elements": "0.81822", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01625", "scoring_system": "epss", "scoring_elements": "0.8182", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01625", "scoring_system": "epss", "scoring_elements": "0.81846", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01625", "scoring_system": "epss", "scoring_elements": "0.81853", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01625", "scoring_system": "epss", "scoring_elements": "0.81872", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01625", "scoring_system": "epss", "scoring_elements": "0.8186", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01625", "scoring_system": "epss", "scoring_elements": "0.81855", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01625", "scoring_system": "epss", "scoring_elements": "0.81892", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01625", "scoring_system": "epss", "scoring_elements": "0.81894", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01625", "scoring_system": "epss", "scoring_elements": "0.81916", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01625", "scoring_system": "epss", "scoring_elements": "0.81927", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01625", "scoring_system": "epss", "scoring_elements": "0.81932", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01625", "scoring_system": "epss", "scoring_elements": "0.81951", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01625", "scoring_system": "epss", "scoring_elements": "0.81971", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5330" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3223" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5252", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5252" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5299", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5330", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5330" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7540" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8467", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8467" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:P/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=0454b95657846fcecf0f51b6f1194faac02518bd", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=0454b95657846fcecf0f51b6f1194faac02518bd" }, { "reference_url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=538d305de91e34a2938f5f219f18bf0e1918763f", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=538d305de91e34a2938f5f219f18bf0e1918763f" }, { "reference_url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=7f51ec8c4ed9ba1f53d722e44fb6fb3cde933b72", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=7f51ec8c4ed9ba1f53d722e44fb6fb3cde933b72" }, { "reference_url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=a118d4220ed85749c07fb43c1229d9e2fecbea6b", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=a118d4220ed85749c07fb43c1229d9e2fecbea6b" }, { "reference_url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=ba5dbda6d0174a59d221c45cca52ecd232820d48", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=ba5dbda6d0174a59d221c45cca52ecd232820d48" }, { "reference_url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=f36cb71c330a52106e36028b3029d952257baf15", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=f36cb71c330a52106e36028b3029d952257baf15" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2015-5330.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.samba.org/samba/security/CVE-2015-5330.html" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3433", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3433" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" }, { "reference_url": "http://www.securityfocus.com/bid/79734", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/79734" }, { "reference_url": "http://www.securitytracker.com/id/1034493", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034493" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2855-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2855-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2855-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2855-2" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2856-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2856-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1281326", "reference_id": "1281326", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1281326" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5330", "reference_id": "CVE-2015-5330", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5330" }, { "reference_url": "https://security.gentoo.org/glsa/201612-47", "reference_id": "GLSA-201612-47", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201612-47" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0006", "reference_id": "RHSA-2016:0006", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0006" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0009", "reference_id": "RHSA-2016:0009", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0009" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0010", "reference_id": "RHSA-2016:0010", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0010" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0014", "reference_id": "RHSA-2016:0014", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0014" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0015", "reference_id": "RHSA-2016:0015", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0015" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0016", "reference_id": "RHSA-2016:0016", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0016" }, { "reference_url": "https://usn.ubuntu.com/2855-1/", "reference_id": "USN-2855-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2855-1/" }, { "reference_url": "https://usn.ubuntu.com/2856-1/", "reference_id": "USN-2856-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2856-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1112581?format=api", "purl": "pkg:deb/debian/samba@2:4.24.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.2%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939034?format=api", "purl": "pkg:deb/debian/samba@2:4.1.22%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.1.22%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938984?format=api", "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18xs-py1v-xfey" }, { "vulnerability": "VCID-28rq-1d68-4bfz" }, { "vulnerability": "VCID-2w26-yjmn-k7an" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5cd3-497h-qkhw" }, { "vulnerability": "VCID-68zz-z589-87f6" }, { "vulnerability": "VCID-6mju-nwzy-pqeq" }, { "vulnerability": "VCID-7xdg-sn88-bkbs" }, { "vulnerability": "VCID-84q8-2457-qkc5" }, { "vulnerability": "VCID-94k8-98me-x3dw" }, { "vulnerability": "VCID-apqw-e2px-yka5" }, { "vulnerability": "VCID-b4ty-d775-5fed" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-bpht-9daq-rfgd" }, { "vulnerability": "VCID-fskg-j9fe-6yeg" }, { "vulnerability": "VCID-hfsk-4cbd-m3b1" }, { "vulnerability": "VCID-kkwp-2x9m-9bgd" }, { "vulnerability": "VCID-q2d9-vahb-6qce" }, { "vulnerability": "VCID-r7va-6j6s-rba5" }, { "vulnerability": "VCID-w4c6-p858-rkaw" }, { "vulnerability": "VCID-wxva-f9ay-c3a2" }, { "vulnerability": "VCID-xmn1-g72k-8qcq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938982?format=api", "purl": "pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938986?format=api", "purl": "pkg:deb/debian/samba@2:4.22.8%2Bdfsg-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.22.8%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938985?format=api", "purl": "pkg:deb/debian/samba@2:4.23.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.23.6%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067630?format=api", "purl": "pkg:deb/debian/samba@2:4.24.1%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.24.1%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2015-5330" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vjmz-bp2f-bbc1" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.1.22%252Bdfsg-1%3Fdistro=trixie" }