Lookup for vulnerable packages by Package URL.

GET /api/packages/994567?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api",
    "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6",
    "type": "deb",
    "namespace": "debian",
    "name": "samba",
    "version": "2:4.13.13+dfsg-1~deb11u6",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": "2:4.17.12+dfsg-0+deb12u2",
    "latest_non_vulnerable_version": "2:4.17.12+dfsg-0+deb12u2",
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48504?format=api",
            "vulnerability_id": "VCID-18xs-py1v-xfey",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0225.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0225.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0225",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57853",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57823",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57798",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57854",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5787",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57849",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57828",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57857",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57856",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61491",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61507",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61502",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61505",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00464",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64299",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0225"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0225",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0225"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182772",
                    "reference_id": "2182772",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182772"
                },
                {
                    "reference_url": "https://www.samba.org/samba/security/CVE-2023-0225.html",
                    "reference_id": "CVE-2023-0225.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-18T15:04:24Z/"
                        }
                    ],
                    "url": "https://www.samba.org/samba/security/CVE-2023-0225.html"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-18T15:04:24Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230406-0007/",
                    "reference_id": "ntap-20230406-0007",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-18T15:04:24Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230406-0007/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994568?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u2"
                }
            ],
            "aliases": [
                "CVE-2023-0225"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-18xs-py1v-xfey"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/45505?format=api",
            "vulnerability_id": "VCID-28rq-1d68-4bfz",
            "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27840.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27840.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27840",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.14523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94417",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.14523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94478",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.14523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94469",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.14523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94474",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.14523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94477",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.14523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94424",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.14523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94435",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.14523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94437",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.14523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94447",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.14523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9445",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.14523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94453",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.14523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94455",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27840"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10730",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10730"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27840",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27840"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20277",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20277"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941400",
                    "reference_id": "1941400",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941400"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985936",
                    "reference_id": "985936",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985936"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1732",
                    "reference_id": "AVG-1732",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1732"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1734",
                    "reference_id": "AVG-1734",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1734"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-22",
                    "reference_id": "GLSA-202105-22",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202105-22"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4888-1/",
                    "reference_id": "USN-4888-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4888-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4888-2/",
                    "reference_id": "USN-4888-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4888-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994568?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u2"
                }
            ],
            "aliases": [
                "CVE-2020-27840"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-28rq-1d68-4bfz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/45507?format=api",
            "vulnerability_id": "VCID-2w26-yjmn-k7an",
            "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20277.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20277.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20277",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.08492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92332",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.08492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92387",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.08492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9238",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.08492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92382",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.08492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92386",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.08492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92339",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.08492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92344",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.08492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92348",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.08492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92359",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.08492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92364",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.08492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92369",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.08492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92371",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.08492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92381",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20277"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10730",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10730"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27840",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27840"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20277",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20277"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941402",
                    "reference_id": "1941402",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941402"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985935",
                    "reference_id": "985935",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985935"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1732",
                    "reference_id": "AVG-1732",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1732"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1734",
                    "reference_id": "AVG-1734",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1734"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-22",
                    "reference_id": "GLSA-202105-22",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202105-22"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1072",
                    "reference_id": "RHSA-2021:1072",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1072"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1197",
                    "reference_id": "RHSA-2021:1197",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1197"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1213",
                    "reference_id": "RHSA-2021:1213",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1213"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1214",
                    "reference_id": "RHSA-2021:1214",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1214"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2331",
                    "reference_id": "RHSA-2021:2331",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2331"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2786",
                    "reference_id": "RHSA-2021:2786",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2786"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4888-1/",
                    "reference_id": "USN-4888-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4888-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4888-2/",
                    "reference_id": "USN-4888-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4888-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994568?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u2"
                }
            ],
            "aliases": [
                "CVE-2021-20277"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2w26-yjmn-k7an"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47300?format=api",
            "vulnerability_id": "VCID-3du2-evy8-jfa1",
            "summary": "Multiple vulnerabilities have been discovered in MIT krb5, the worst of which could lead to remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42898.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42898.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.08257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92245",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.08257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9225",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.08257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92249",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.08734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92515",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.08889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9254",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.08889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92532",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.08889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92575",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.08889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92565",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.08889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92564",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.08889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92558",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.08889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92553",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.08889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92542",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187",
                    "reference_id": "1024187",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024267",
                    "reference_id": "1024267",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024267"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140960",
                    "reference_id": "2140960",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140960"
                },
                {
                    "reference_url": "https://web.mit.edu/kerberos/advisories/",
                    "reference_id": "advisories",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"
                        }
                    ],
                    "url": "https://web.mit.edu/kerberos/advisories/"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2828",
                    "reference_id": "AVG-2828",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Unknown",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2828"
                },
                {
                    "reference_url": "https://www.samba.org/samba/security/CVE-2022-42898.html",
                    "reference_id": "CVE-2022-42898.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"
                        }
                    ],
                    "url": "https://www.samba.org/samba/security/CVE-2022-42898.html"
                },
                {
                    "reference_url": "https://github.com/krb5/krb5/commit/ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583",
                    "reference_id": "ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"
                        }
                    ],
                    "url": "https://github.com/krb5/krb5/commit/ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583"
                },
                {
                    "reference_url": "https://github.com/heimdal/heimdal/security/advisories/GHSA-64mq-fvfj-5x3c",
                    "reference_id": "GHSA-64mq-fvfj-5x3c",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"
                        }
                    ],
                    "url": "https://github.com/heimdal/heimdal/security/advisories/GHSA-64mq-fvfj-5x3c"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202310-06",
                    "reference_id": "GLSA-202310-06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202310-06"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-11",
                    "reference_id": "GLSA-202405-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-11"
                },
                {
                    "reference_url": "https://web.mit.edu/kerberos/krb5-1.19/",
                    "reference_id": "krb5-1.19",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"
                        }
                    ],
                    "url": "https://web.mit.edu/kerberos/krb5-1.19/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230216-0008/",
                    "reference_id": "ntap-20230216-0008",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230216-0008/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230223-0001/",
                    "reference_id": "ntap-20230223-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230223-0001/"
                },
                {
                    "reference_url": "https://web.mit.edu/kerberos/krb5-1.20/README-1.20.1.txt",
                    "reference_id": "README-1.20.1.txt",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"
                        }
                    ],
                    "url": "https://web.mit.edu/kerberos/krb5-1.20/README-1.20.1.txt"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8637",
                    "reference_id": "RHSA-2022:8637",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8637"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8638",
                    "reference_id": "RHSA-2022:8638",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8638"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8639",
                    "reference_id": "RHSA-2022:8639",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8639"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8640",
                    "reference_id": "RHSA-2022:8640",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8640"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8641",
                    "reference_id": "RHSA-2022:8641",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8641"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8648",
                    "reference_id": "RHSA-2022:8648",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8648"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8662",
                    "reference_id": "RHSA-2022:8662",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8662"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8663",
                    "reference_id": "RHSA-2022:8663",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8663"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8669",
                    "reference_id": "RHSA-2022:8669",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8669"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9029",
                    "reference_id": "RHSA-2022:9029",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9029"
                },
                {
                    "reference_url": "https://bugzilla.samba.org/show_bug.cgi?id=15203",
                    "reference_id": "show_bug.cgi?id=15203",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"
                        }
                    ],
                    "url": "https://bugzilla.samba.org/show_bug.cgi?id=15203"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5800-1/",
                    "reference_id": "USN-5800-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5800-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5822-1/",
                    "reference_id": "USN-5822-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5822-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5828-1/",
                    "reference_id": "USN-5828-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5828-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5936-1/",
                    "reference_id": "USN-5936-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5936-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7582-1/",
                    "reference_id": "USN-7582-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7582-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994568?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u2"
                }
            ],
            "aliases": [
                "CVE-2022-42898"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3du2-evy8-jfa1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48502?format=api",
            "vulnerability_id": "VCID-5cd3-497h-qkhw",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38023.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38023.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38023",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00354",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57804",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00354",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57757",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00354",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5773",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00354",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57785",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00354",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57787",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00354",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57782",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00354",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57761",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00354",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57789",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00354",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57735",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00481",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65162",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00481",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65149",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00481",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65163",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00481",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6515",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00481",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65134",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38023"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38023",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38023"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154362",
                    "reference_id": "2154362",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154362"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2828",
                    "reference_id": "AVG-2828",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Unknown",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2828"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0637",
                    "reference_id": "RHSA-2023:0637",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0637"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0638",
                    "reference_id": "RHSA-2023:0638",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0638"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0639",
                    "reference_id": "RHSA-2023:0639",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0639"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0838",
                    "reference_id": "RHSA-2023:0838",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0838"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:1090",
                    "reference_id": "RHSA-2023:1090",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:1090"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2127",
                    "reference_id": "RHSA-2023:2127",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2127"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2136",
                    "reference_id": "RHSA-2023:2136",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2136"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2137",
                    "reference_id": "RHSA-2023:2137",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2137"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3491",
                    "reference_id": "RHSA-2023:3491",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3491"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5822-1/",
                    "reference_id": "USN-5822-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5822-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5936-1/",
                    "reference_id": "USN-5936-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5936-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994568?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u2"
                }
            ],
            "aliases": [
                "CVE-2022-38023"
            ],
            "risk_score": 3.6,
            "exploitability": "0.5",
            "weighted_severity": "7.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5cd3-497h-qkhw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66870?format=api",
            "vulnerability_id": "VCID-68zz-z589-87f6",
            "summary": "samba: Command Injection in WINS Server Hook Script",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-10230.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-10230.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-10230",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50239",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50186",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50232",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5026",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50234",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50222",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50267",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51223",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51198",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59395",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59376",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59353",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59373",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59357",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-10230"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10230",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10230"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2394377",
                    "reference_id": "2394377",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-11-08T04:55:22Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2394377"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4",
                    "reference_id": "cpe:/a:redhat:openshift:4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:6",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2025-10230",
                    "reference_id": "CVE-2025-10230",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-11-08T04:55:22Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2025-10230"
                },
                {
                    "reference_url": "https://www.samba.org/samba/history/security.html",
                    "reference_id": "security.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-11-08T04:55:22Z/"
                        }
                    ],
                    "url": "https://www.samba.org/samba/history/security.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7826-1/",
                    "reference_id": "USN-7826-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7826-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7826-2/",
                    "reference_id": "USN-7826-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7826-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994568?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u2"
                }
            ],
            "aliases": [
                "CVE-2025-10230"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-68zz-z589-87f6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48494?format=api",
            "vulnerability_id": "VCID-6mju-nwzy-pqeq",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32743.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32743.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32743",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78461",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78492",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78475",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78502",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78507",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78532",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78514",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78506",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78534",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78533",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78531",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78564",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78571",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78588",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32743"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32743",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32743"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021022",
                    "reference_id": "1021022",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021022"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2121128",
                    "reference_id": "2121128",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2121128"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994568?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u2"
                }
            ],
            "aliases": [
                "CVE-2022-32743"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6mju-nwzy-pqeq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66871?format=api",
            "vulnerability_id": "VCID-745n-wca7-d7fh",
            "summary": "samba: vfs_streams_xattr uninitialized memory write possible",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-9640.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-9640.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-9640",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2274",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23062",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22965",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22958",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22922",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22752",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22747",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23106",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22898",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2297",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23023",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23042",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23004",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22949",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-9640"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9640",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9640"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2391698",
                    "reference_id": "2391698",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-15T13:06:54Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2391698"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4",
                    "reference_id": "cpe:/a:redhat:openshift:4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:6",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2025-9640",
                    "reference_id": "CVE-2025-9640",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-15T13:06:54Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2025-9640"
                },
                {
                    "reference_url": "https://www.samba.org/samba/history/security.html",
                    "reference_id": "security.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-15T13:06:54Z/"
                        }
                    ],
                    "url": "https://www.samba.org/samba/history/security.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7826-1/",
                    "reference_id": "USN-7826-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7826-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7826-2/",
                    "reference_id": "USN-7826-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7826-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994568?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u2"
                }
            ],
            "aliases": [
                "CVE-2025-9640"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-745n-wca7-d7fh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48503?format=api",
            "vulnerability_id": "VCID-7xdg-sn88-bkbs",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45141.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45141.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-45141",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71425",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71328",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71374",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71381",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71361",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71413",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71421",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7129",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71308",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71282",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71324",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71337",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7136",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71345",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-45141"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45141",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45141"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154376",
                    "reference_id": "2154376",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154376"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2828",
                    "reference_id": "AVG-2828",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Unknown",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2828"
                },
                {
                    "reference_url": "https://www.samba.org/samba/security/CVE-2022-45141.html",
                    "reference_id": "CVE-2022-45141.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-03-06T20:38:03Z/"
                        }
                    ],
                    "url": "https://www.samba.org/samba/security/CVE-2022-45141.html"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-03-06T20:38:03Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5822-1/",
                    "reference_id": "USN-5822-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5822-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5936-1/",
                    "reference_id": "USN-5936-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5936-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7582-1/",
                    "reference_id": "USN-7582-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7582-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994568?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u2"
                }
            ],
            "aliases": [
                "CVE-2022-45141"
            ],
            "risk_score": 3.6,
            "exploitability": "0.5",
            "weighted_severity": "7.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7xdg-sn88-bkbs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48501?format=api",
            "vulnerability_id": "VCID-84q8-2457-qkc5",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-37967.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-37967.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-37967",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02981",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86566",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.02981",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86547",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02981",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8654",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02981",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86558",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02981",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86567",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02981",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86474",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02981",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86492",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02981",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86511",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02981",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8652",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02981",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86535",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02981",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86532",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02981",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86526",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02981",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86541",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-37967"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37967",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37967"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154320",
                    "reference_id": "2154320",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154320"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2828",
                    "reference_id": "AVG-2828",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Unknown",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2828"
                },
                {
                    "reference_url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37967",
                    "reference_id": "CVE-2022-37967",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T13:57:00Z/"
                        }
                    ],
                    "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37967"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5822-1/",
                    "reference_id": "USN-5822-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5822-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5936-1/",
                    "reference_id": "USN-5936-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5936-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994568?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u2"
                }
            ],
            "aliases": [
                "CVE-2022-37967"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-84q8-2457-qkc5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48484?format=api",
            "vulnerability_id": "VCID-94k8-98me-x3dw",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44141.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44141.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-44141",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54042",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54024",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54064",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54068",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54051",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54018",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54029",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54013",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5406",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54041",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5407",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53997",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54015",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54018",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-44141"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44141",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44141"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004692",
                    "reference_id": "1004692",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004692"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046120",
                    "reference_id": "2046120",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046120"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2648",
                    "reference_id": "AVG-2648",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2648"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1756",
                    "reference_id": "RHSA-2022:1756",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1756"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:2074",
                    "reference_id": "RHSA-2022:2074",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:2074"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994568?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u2"
                }
            ],
            "aliases": [
                "CVE-2021-44141"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-94k8-98me-x3dw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46961?format=api",
            "vulnerability_id": "VCID-apqw-e2px-yka5",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which can lead to remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14628.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14628.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14628",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65978",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6602",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66049",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66016",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66065",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66078",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66097",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66084",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66054",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66089",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66104",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66091",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66112",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66123",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66121",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14628"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14628",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14628"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034803",
                    "reference_id": "1034803",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034803"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1625445",
                    "reference_id": "1625445",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1625445"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-28",
                    "reference_id": "GLSA-202402-28",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-28"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994568?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u2"
                }
            ],
            "aliases": [
                "CVE-2018-14628"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-apqw-e2px-yka5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48487?format=api",
            "vulnerability_id": "VCID-b4ty-d775-5fed",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1615.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1615.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00259",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49261",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50175",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50161",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50167",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00285",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51911",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00285",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51965",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00285",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51964",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00285",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52015",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00285",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51998",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00285",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51982",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00285",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52024",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00285",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5203",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00285",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51872",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00285",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5192",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00285",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51947",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1615"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1615"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021024",
                    "reference_id": "1021024",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021024"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122649",
                    "reference_id": "2122649",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122649"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2519",
                    "reference_id": "RHSA-2023:2519",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2519"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2987",
                    "reference_id": "RHSA-2023:2987",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2987"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0423",
                    "reference_id": "RHSA-2024:0423",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0423"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994568?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u2"
                }
            ],
            "aliases": [
                "CVE-2022-1615"
            ],
            "risk_score": 2.3,
            "exploitability": "0.5",
            "weighted_severity": "4.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b4ty-d775-5fed"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49839?format=api",
            "vulnerability_id": "VCID-bc1t-hzu5-bffd",
            "summary": "Multiple vulnerabilities have been discovered in Heimdal, the worst of which could lead to remote code execution on a KDC.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-44640",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78771",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78824",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78815",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78843",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7884",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78838",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78866",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78873",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78803",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78785",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7881",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78818",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78841",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01265",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79535",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-44640"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187",
                    "reference_id": "1024187",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187"
                },
                {
                    "reference_url": "https://github.com/heimdal/heimdal/security/advisories/GHSA-88pm-hfmq-7vv4",
                    "reference_id": "GHSA-88pm-hfmq-7vv4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T13:20:08Z/"
                        }
                    ],
                    "url": "https://github.com/heimdal/heimdal/security/advisories/GHSA-88pm-hfmq-7vv4"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202310-06",
                    "reference_id": "GLSA-202310-06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T13:20:08Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202310-06"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230216-0008/",
                    "reference_id": "ntap-20230216-0008",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T13:20:08Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230216-0008/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5800-1/",
                    "reference_id": "USN-5800-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5800-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994568?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u2"
                }
            ],
            "aliases": [
                "CVE-2022-44640"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bc1t-hzu5-bffd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48507?format=api",
            "vulnerability_id": "VCID-bpht-9daq-rfgd",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0922.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0922.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0922",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00229",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45679",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00229",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45699",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00229",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45647",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00229",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45703",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00229",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45722",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00229",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45692",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00229",
                            "scoring_system": "epss",
                            "scoring_elements": "0.457",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00229",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45749",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00229",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45744",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00266",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50098",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00266",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50085",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00266",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50089",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00266",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50043",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0922"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0922",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0922"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182774",
                    "reference_id": "2182774",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182774"
                },
                {
                    "reference_url": "https://www.samba.org/samba/security/CVE-2023-0922.html",
                    "reference_id": "CVE-2023-0922.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T14:54:28Z/"
                        }
                    ],
                    "url": "https://www.samba.org/samba/security/CVE-2023-0922.html"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T14:54:28Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230406-0007/",
                    "reference_id": "ntap-20230406-0007",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T14:54:28Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230406-0007/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5993-1/",
                    "reference_id": "USN-5993-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5993-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YXBPYIA4VWNOD437NAHZ3NXKAETLFB5S/",
                    "reference_id": "YXBPYIA4VWNOD437NAHZ3NXKAETLFB5S",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T14:54:28Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YXBPYIA4VWNOD437NAHZ3NXKAETLFB5S/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994568?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u2"
                }
            ],
            "aliases": [
                "CVE-2023-0922"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bpht-9daq-rfgd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48481?format=api",
            "vulnerability_id": "VCID-fskg-j9fe-6yeg",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20251.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20251.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20251",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44742",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44822",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4465",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44879",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44872",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44807",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4472",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44727",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44843",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44783",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44836",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44838",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44855",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44824",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44826",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20251"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20251",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20251"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1929800",
                    "reference_id": "1929800",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:49:41Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1929800"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:49:41Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230331-0005/",
                    "reference_id": "ntap-20230331-0005",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:49:41Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230331-0005/"
                },
                {
                    "reference_url": "https://bugzilla.samba.org/show_bug.cgi?id=14611",
                    "reference_id": "show_bug.cgi?id=14611",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:49:41Z/"
                        }
                    ],
                    "url": "https://bugzilla.samba.org/show_bug.cgi?id=14611"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5822-1/",
                    "reference_id": "USN-5822-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5822-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994568?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u2"
                }
            ],
            "aliases": [
                "CVE-2021-20251"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fskg-j9fe-6yeg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48506?format=api",
            "vulnerability_id": "VCID-hfsk-4cbd-m3b1",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0614.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0614.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0614",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40636",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40714",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40687",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40696",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40713",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40678",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40659",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40704",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40674",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44492",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44409",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44413",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44332",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00246",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47868",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0614"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0614",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0614"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182776",
                    "reference_id": "2182776",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182776"
                },
                {
                    "reference_url": "https://www.samba.org/samba/security/CVE-2023-0614.html",
                    "reference_id": "CVE-2023-0614.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T14:52:15Z/"
                        }
                    ],
                    "url": "https://www.samba.org/samba/security/CVE-2023-0614.html"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T14:52:15Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230406-0007/",
                    "reference_id": "ntap-20230406-0007",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T14:52:15Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230406-0007/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5992-1/",
                    "reference_id": "USN-5992-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5992-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5993-1/",
                    "reference_id": "USN-5993-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5993-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YXBPYIA4VWNOD437NAHZ3NXKAETLFB5S/",
                    "reference_id": "YXBPYIA4VWNOD437NAHZ3NXKAETLFB5S",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T14:52:15Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YXBPYIA4VWNOD437NAHZ3NXKAETLFB5S/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994568?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u2"
                }
            ],
            "aliases": [
                "CVE-2023-0614"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "6.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hfsk-4cbd-m3b1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79340?format=api",
            "vulnerability_id": "VCID-kkwp-2x9m-9bgd",
            "summary": "samba: check attribute access rights for LDAP adds of computers",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25720.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25720.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25720",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42702",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51397",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51424",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51383",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51347",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52544",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52534",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52591",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52598",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52583",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59542",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59546",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59559",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59577",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59561",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25720"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25720",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25720"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2305954",
                    "reference_id": "2305954",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-17T16:18:39Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2305954"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4",
                    "reference_id": "cpe:/a:redhat:openshift:4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:storage:3",
                    "reference_id": "cpe:/a:redhat:storage:3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:storage:3"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:6",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2020-25720",
                    "reference_id": "CVE-2020-25720",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-17T16:18:39Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2020-25720"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994568?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u2"
                }
            ],
            "aliases": [
                "CVE-2020-25720"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kkwp-2x9m-9bgd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46966?format=api",
            "vulnerability_id": "VCID-q2d9-vahb-6qce",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which can lead to remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4154.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4154.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4154",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54512",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54535",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54504",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54556",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5455",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54562",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54544",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54523",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00397",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60557",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00397",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60575",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00397",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60582",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00397",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60569",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00397",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60555",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00397",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60568",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4154"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4154",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4154"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241883",
                    "reference_id": "2241883",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241883"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-28",
                    "reference_id": "GLSA-202402-28",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-28"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6425-1/",
                    "reference_id": "USN-6425-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6425-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6425-3/",
                    "reference_id": "USN-6425-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6425-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994568?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u2"
                }
            ],
            "aliases": [
                "CVE-2023-4154"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q2d9-vahb-6qce"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46970?format=api",
            "vulnerability_id": "VCID-r7va-6j6s-rba5",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which can lead to remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42669.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42669.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-42669",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68927",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68789",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6888",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68866",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68837",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68878",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68889",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68915",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68921",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6881",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68788",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68839",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68858",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-42669"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42669",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42669"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241884",
                    "reference_id": "2241884",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-30T14:56:59Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241884"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:8::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:8::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::resilientstorage",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::resilientstorage",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::resilientstorage"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream",
                    "reference_id": "cpe:/a:redhat:rhel_eus:8.6::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb",
                    "reference_id": "cpe:/a:redhat:rhel_eus:8.6::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream",
                    "reference_id": "cpe:/a:redhat:rhel_eus:8.8::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb",
                    "reference_id": "cpe:/a:redhat:rhel_eus:8.8::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream",
                    "reference_id": "cpe:/a:redhat:rhel_eus:9.0::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb",
                    "reference_id": "cpe:/a:redhat:rhel_eus:9.0::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::resilientstorage",
                    "reference_id": "cpe:/a:redhat:rhel_eus:9.0::resilientstorage",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::resilientstorage"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream",
                    "reference_id": "cpe:/a:redhat:rhel_eus:9.2::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb",
                    "reference_id": "cpe:/a:redhat:rhel_eus:9.2::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::resilientstorage",
                    "reference_id": "cpe:/a:redhat:rhel_eus:9.2::resilientstorage",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::resilientstorage"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:storage:3",
                    "reference_id": "cpe:/a:redhat:storage:3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:storage:3"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:6",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:8::baseos",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:9::baseos",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos",
                    "reference_id": "cpe:/o:redhat:rhel_eus:8.6::baseos",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos",
                    "reference_id": "cpe:/o:redhat:rhel_eus:8.8::baseos",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.0::baseos",
                    "reference_id": "cpe:/o:redhat:rhel_eus:9.0::baseos",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.0::baseos"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos",
                    "reference_id": "cpe:/o:redhat:rhel_eus:9.2::baseos",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8",
                    "reference_id": "cpe:/o:redhat:rhev_hypervisor:4.4::el8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2023-42669",
                    "reference_id": "CVE-2023-42669",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-30T14:56:59Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2023-42669"
                },
                {
                    "reference_url": "https://www.samba.org/samba/security/CVE-2023-42669.html",
                    "reference_id": "CVE-2023-42669.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-30T14:56:59Z/"
                        }
                    ],
                    "url": "https://www.samba.org/samba/security/CVE-2023-42669.html"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-28",
                    "reference_id": "GLSA-202402-28",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-28"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6209",
                    "reference_id": "RHSA-2023:6209",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-30T14:56:59Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6209"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6744",
                    "reference_id": "RHSA-2023:6744",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-30T14:56:59Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6744"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7371",
                    "reference_id": "RHSA-2023:7371",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-30T14:56:59Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7371"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7408",
                    "reference_id": "RHSA-2023:7408",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-30T14:56:59Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7408"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7464",
                    "reference_id": "RHSA-2023:7464",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-30T14:56:59Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7464"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7467",
                    "reference_id": "RHSA-2023:7467",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-30T14:56:59Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7467"
                },
                {
                    "reference_url": "https://bugzilla.samba.org/show_bug.cgi?id=15474",
                    "reference_id": "show_bug.cgi?id=15474",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-30T14:56:59Z/"
                        }
                    ],
                    "url": "https://bugzilla.samba.org/show_bug.cgi?id=15474"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6425-1/",
                    "reference_id": "USN-6425-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6425-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6425-3/",
                    "reference_id": "USN-6425-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6425-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994568?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u2"
                }
            ],
            "aliases": [
                "CVE-2023-42669"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r7va-6j6s-rba5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48479?format=api",
            "vulnerability_id": "VCID-w4c6-p858-rkaw",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3670.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3670.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3670",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86885",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86903",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86874",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87472",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87467",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87464",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87478",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8748",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87494",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87501",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.03426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87435",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87453",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8746",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3670"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3670",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3670"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077533",
                    "reference_id": "2077533",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077533"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5542-1/",
                    "reference_id": "USN-5542-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5542-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994568?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u2"
                }
            ],
            "aliases": [
                "CVE-2021-3670"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w4c6-p858-rkaw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48482?format=api",
            "vulnerability_id": "VCID-wxva-f9ay-c3a2",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20316.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20316.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72249",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72255",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72274",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7225",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72289",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72301",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72323",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72307",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72294",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72336",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72345",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72333",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72376",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72386",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72382",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20316"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20316"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004690",
                    "reference_id": "1004690",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004690"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2009673",
                    "reference_id": "2009673",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2009673"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1756",
                    "reference_id": "RHSA-2022:1756",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1756"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:2074",
                    "reference_id": "RHSA-2022:2074",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:2074"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994568?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u2"
                }
            ],
            "aliases": [
                "CVE-2021-20316"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wxva-f9ay-c3a2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48500?format=api",
            "vulnerability_id": "VCID-xmn1-g72k-8qcq",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-37966.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-37966.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-37966",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80345",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80291",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80295",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80321",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80327",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80215",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80235",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80224",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80252",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80262",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8028",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80265",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80259",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80289",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-37966"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37966",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37966"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154303",
                    "reference_id": "2154303",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154303"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2828",
                    "reference_id": "AVG-2828",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Unknown",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2828"
                },
                {
                    "reference_url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37966",
                    "reference_id": "CVE-2022-37966",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T13:50:56Z/"
                        }
                    ],
                    "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37966"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5822-1/",
                    "reference_id": "USN-5822-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5822-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5936-1/",
                    "reference_id": "USN-5936-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5936-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994568?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u2"
                }
            ],
            "aliases": [
                "CVE-2022-37966"
            ],
            "risk_score": 3.6,
            "exploitability": "0.5",
            "weighted_severity": "7.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xmn1-g72k-8qcq"
        }
    ],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/44838?format=api",
            "vulnerability_id": "VCID-2dm7-xt4e-wkex",
            "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14303.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14303.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14303",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.26364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96273",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.26364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9633",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.26364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96327",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.26364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96329",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.26364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96281",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.26364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96289",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.26364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96293",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.26364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96302",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.26364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96305",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.26364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96309",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.26364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96312",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.26364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96321",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.26364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96325",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14303"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14303",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14303"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1851298",
                    "reference_id": "1851298",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1851298"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1202",
                    "reference_id": "AVG-1202",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1202"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202007-15",
                    "reference_id": "GLSA-202007-15",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202007-15"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4454-1/",
                    "reference_id": "USN-4454-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4454-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4454-2/",
                    "reference_id": "USN-4454-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4454-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18xs-py1v-xfey"
                        },
                        {
                            "vulnerability": "VCID-28rq-1d68-4bfz"
                        },
                        {
                            "vulnerability": "VCID-2w26-yjmn-k7an"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5cd3-497h-qkhw"
                        },
                        {
                            "vulnerability": "VCID-68zz-z589-87f6"
                        },
                        {
                            "vulnerability": "VCID-6mju-nwzy-pqeq"
                        },
                        {
                            "vulnerability": "VCID-745n-wca7-d7fh"
                        },
                        {
                            "vulnerability": "VCID-7xdg-sn88-bkbs"
                        },
                        {
                            "vulnerability": "VCID-84q8-2457-qkc5"
                        },
                        {
                            "vulnerability": "VCID-94k8-98me-x3dw"
                        },
                        {
                            "vulnerability": "VCID-apqw-e2px-yka5"
                        },
                        {
                            "vulnerability": "VCID-b4ty-d775-5fed"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-bpht-9daq-rfgd"
                        },
                        {
                            "vulnerability": "VCID-fskg-j9fe-6yeg"
                        },
                        {
                            "vulnerability": "VCID-hfsk-4cbd-m3b1"
                        },
                        {
                            "vulnerability": "VCID-kkwp-2x9m-9bgd"
                        },
                        {
                            "vulnerability": "VCID-q2d9-vahb-6qce"
                        },
                        {
                            "vulnerability": "VCID-r7va-6j6s-rba5"
                        },
                        {
                            "vulnerability": "VCID-w4c6-p858-rkaw"
                        },
                        {
                            "vulnerability": "VCID-wxva-f9ay-c3a2"
                        },
                        {
                            "vulnerability": "VCID-xmn1-g72k-8qcq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"
                }
            ],
            "aliases": [
                "CVE-2020-14303"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2dm7-xt4e-wkex"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47963?format=api",
            "vulnerability_id": "VCID-2gkd-vubu-j7fd",
            "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n    which could lead to remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14861.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14861.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14861",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04997",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89733",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.04997",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89663",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04997",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89666",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04997",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8968",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04997",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89683",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04997",
                            "scoring_system": "epss",
                            "scoring_elements": "0.897",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04997",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89706",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04997",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89713",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04997",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89712",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04997",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89705",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04997",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89721",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.04997",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89722",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.04997",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89717",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.04997",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89732",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.04997",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89734",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14861"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14861",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14861"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778586",
                    "reference_id": "1778586",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778586"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/06/24/3",
                    "reference_id": "3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/06/24/3"
                },
                {
                    "reference_url": "https://www.samba.org/samba/security/CVE-2019-14861.html",
                    "reference_id": "CVE-2019-14861.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/"
                        }
                    ],
                    "url": "https://www.samba.org/samba/security/CVE-2019-14861.html"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202003-52",
                    "reference_id": "GLSA-202003-52",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202003-52"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00038.html",
                    "reference_id": "msg00038.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00038.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20191210-0002/",
                    "reference_id": "ntap-20191210-0002",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20191210-0002/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PJH3ROOFYMOATD2UEPC47P5RPBDTY77E/",
                    "reference_id": "PJH3ROOFYMOATD2UEPC47P5RPBDTY77E",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PJH3ROOFYMOATD2UEPC47P5RPBDTY77E/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14861",
                    "reference_id": "show_bug.cgi?id=CVE-2019-14861",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14861"
                },
                {
                    "reference_url": "https://www.synology.com/security/advisory/Synology_SA_19_40",
                    "reference_id": "Synology_SA_19_40",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/"
                        }
                    ],
                    "url": "https://www.synology.com/security/advisory/Synology_SA_19_40"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4217-1/",
                    "reference_id": "USN-4217-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4217-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4217-2/",
                    "reference_id": "USN-4217-2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4217-2/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNKA4YIPV7AZR7KK3GW6L3HKGHSGJZFE/",
                    "reference_id": "WNKA4YIPV7AZR7KK3GW6L3HKGHSGJZFE",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNKA4YIPV7AZR7KK3GW6L3HKGHSGJZFE/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18xs-py1v-xfey"
                        },
                        {
                            "vulnerability": "VCID-28rq-1d68-4bfz"
                        },
                        {
                            "vulnerability": "VCID-2w26-yjmn-k7an"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5cd3-497h-qkhw"
                        },
                        {
                            "vulnerability": "VCID-68zz-z589-87f6"
                        },
                        {
                            "vulnerability": "VCID-6mju-nwzy-pqeq"
                        },
                        {
                            "vulnerability": "VCID-745n-wca7-d7fh"
                        },
                        {
                            "vulnerability": "VCID-7xdg-sn88-bkbs"
                        },
                        {
                            "vulnerability": "VCID-84q8-2457-qkc5"
                        },
                        {
                            "vulnerability": "VCID-94k8-98me-x3dw"
                        },
                        {
                            "vulnerability": "VCID-apqw-e2px-yka5"
                        },
                        {
                            "vulnerability": "VCID-b4ty-d775-5fed"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-bpht-9daq-rfgd"
                        },
                        {
                            "vulnerability": "VCID-fskg-j9fe-6yeg"
                        },
                        {
                            "vulnerability": "VCID-hfsk-4cbd-m3b1"
                        },
                        {
                            "vulnerability": "VCID-kkwp-2x9m-9bgd"
                        },
                        {
                            "vulnerability": "VCID-q2d9-vahb-6qce"
                        },
                        {
                            "vulnerability": "VCID-r7va-6j6s-rba5"
                        },
                        {
                            "vulnerability": "VCID-w4c6-p858-rkaw"
                        },
                        {
                            "vulnerability": "VCID-wxva-f9ay-c3a2"
                        },
                        {
                            "vulnerability": "VCID-xmn1-g72k-8qcq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"
                }
            ],
            "aliases": [
                "CVE-2019-14861"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2gkd-vubu-j7fd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48483?format=api",
            "vulnerability_id": "VCID-47k4-8k1s-zff2",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23192.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23192.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23192",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28302",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28652",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28604",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2849",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28378",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31176",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31052",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31081",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31088",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31044",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30999",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3103",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31002",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31128",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30996",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23192"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019666",
                    "reference_id": "2019666",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019666"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2538",
                    "reference_id": "AVG-2538",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2538"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4843",
                    "reference_id": "RHSA-2021:4843",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4843"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5082",
                    "reference_id": "RHSA-2021:5082",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5082"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0008",
                    "reference_id": "RHSA-2022:0008",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0008"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5142-1/",
                    "reference_id": "USN-5142-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5142-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18xs-py1v-xfey"
                        },
                        {
                            "vulnerability": "VCID-28rq-1d68-4bfz"
                        },
                        {
                            "vulnerability": "VCID-2w26-yjmn-k7an"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5cd3-497h-qkhw"
                        },
                        {
                            "vulnerability": "VCID-68zz-z589-87f6"
                        },
                        {
                            "vulnerability": "VCID-6mju-nwzy-pqeq"
                        },
                        {
                            "vulnerability": "VCID-745n-wca7-d7fh"
                        },
                        {
                            "vulnerability": "VCID-7xdg-sn88-bkbs"
                        },
                        {
                            "vulnerability": "VCID-84q8-2457-qkc5"
                        },
                        {
                            "vulnerability": "VCID-94k8-98me-x3dw"
                        },
                        {
                            "vulnerability": "VCID-apqw-e2px-yka5"
                        },
                        {
                            "vulnerability": "VCID-b4ty-d775-5fed"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-bpht-9daq-rfgd"
                        },
                        {
                            "vulnerability": "VCID-fskg-j9fe-6yeg"
                        },
                        {
                            "vulnerability": "VCID-hfsk-4cbd-m3b1"
                        },
                        {
                            "vulnerability": "VCID-kkwp-2x9m-9bgd"
                        },
                        {
                            "vulnerability": "VCID-q2d9-vahb-6qce"
                        },
                        {
                            "vulnerability": "VCID-r7va-6j6s-rba5"
                        },
                        {
                            "vulnerability": "VCID-w4c6-p858-rkaw"
                        },
                        {
                            "vulnerability": "VCID-wxva-f9ay-c3a2"
                        },
                        {
                            "vulnerability": "VCID-xmn1-g72k-8qcq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"
                }
            ],
            "aliases": [
                "CVE-2021-23192"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-47k4-8k1s-zff2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81895?format=api",
            "vulnerability_id": "VCID-4qm6-a9un-nyda",
            "summary": "samba: samba AD DC LDAP denial of service via dirsync",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14847.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14847.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14847",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02434",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8509",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02434",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85212",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.02434",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85161",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02434",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85182",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02434",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85183",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02434",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85205",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02434",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85214",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02434",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85103",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02434",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8512",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02434",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85124",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02434",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85145",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02434",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85152",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02434",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85167",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02434",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85164",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14847"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14847",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14847"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14847",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14847"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKPYHDFI7HRELVXBE5J4MTGSI35AKFBI/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKPYHDFI7HRELVXBE5J4MTGSI35AKFBI/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3IUACPZJXSC4OM6P2V4IC4QMZQZWPD/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3IUACPZJXSC4OM6P2V4IC4QMZQZWPD/"
                },
                {
                    "reference_url": "https://www.samba.org/samba/security/CVE-2019-14847.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.samba.org/samba/security/CVE-2019-14847.html"
                },
                {
                    "reference_url": "https://www.synology.com/security/advisory/Synology_SA_19_35",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.synology.com/security/advisory/Synology_SA_19_35"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764142",
                    "reference_id": "1764142",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764142"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201911-6",
                    "reference_id": "ASA-201911-6",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201911-6"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1057",
                    "reference_id": "AVG-1057",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1057"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14847",
                    "reference_id": "CVE-2019-14847",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14847"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4167-1/",
                    "reference_id": "USN-4167-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4167-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4167-2/",
                    "reference_id": "USN-4167-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4167-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18xs-py1v-xfey"
                        },
                        {
                            "vulnerability": "VCID-28rq-1d68-4bfz"
                        },
                        {
                            "vulnerability": "VCID-2w26-yjmn-k7an"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5cd3-497h-qkhw"
                        },
                        {
                            "vulnerability": "VCID-68zz-z589-87f6"
                        },
                        {
                            "vulnerability": "VCID-6mju-nwzy-pqeq"
                        },
                        {
                            "vulnerability": "VCID-745n-wca7-d7fh"
                        },
                        {
                            "vulnerability": "VCID-7xdg-sn88-bkbs"
                        },
                        {
                            "vulnerability": "VCID-84q8-2457-qkc5"
                        },
                        {
                            "vulnerability": "VCID-94k8-98me-x3dw"
                        },
                        {
                            "vulnerability": "VCID-apqw-e2px-yka5"
                        },
                        {
                            "vulnerability": "VCID-b4ty-d775-5fed"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-bpht-9daq-rfgd"
                        },
                        {
                            "vulnerability": "VCID-fskg-j9fe-6yeg"
                        },
                        {
                            "vulnerability": "VCID-hfsk-4cbd-m3b1"
                        },
                        {
                            "vulnerability": "VCID-kkwp-2x9m-9bgd"
                        },
                        {
                            "vulnerability": "VCID-q2d9-vahb-6qce"
                        },
                        {
                            "vulnerability": "VCID-r7va-6j6s-rba5"
                        },
                        {
                            "vulnerability": "VCID-w4c6-p858-rkaw"
                        },
                        {
                            "vulnerability": "VCID-wxva-f9ay-c3a2"
                        },
                        {
                            "vulnerability": "VCID-xmn1-g72k-8qcq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"
                }
            ],
            "aliases": [
                "CVE-2019-14847"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4qm6-a9un-nyda"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47966?format=api",
            "vulnerability_id": "VCID-55zj-6b4s-8ker",
            "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n    which could lead to remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14902.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14902.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14902",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03503",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87558",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03503",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87567",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03503",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87581",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03503",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87583",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03503",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87602",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03503",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87609",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03503",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8762",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03503",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87615",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03503",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87612",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03503",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87627",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03503",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87628",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03503",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87625",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03503",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87643",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03503",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8765",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.03503",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87648",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14902"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14902",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14902"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1791201",
                    "reference_id": "1791201",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1791201"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202003-52",
                    "reference_id": "GLSA-202003-52",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202003-52"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4244-1/",
                    "reference_id": "USN-4244-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4244-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18xs-py1v-xfey"
                        },
                        {
                            "vulnerability": "VCID-28rq-1d68-4bfz"
                        },
                        {
                            "vulnerability": "VCID-2w26-yjmn-k7an"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5cd3-497h-qkhw"
                        },
                        {
                            "vulnerability": "VCID-68zz-z589-87f6"
                        },
                        {
                            "vulnerability": "VCID-6mju-nwzy-pqeq"
                        },
                        {
                            "vulnerability": "VCID-745n-wca7-d7fh"
                        },
                        {
                            "vulnerability": "VCID-7xdg-sn88-bkbs"
                        },
                        {
                            "vulnerability": "VCID-84q8-2457-qkc5"
                        },
                        {
                            "vulnerability": "VCID-94k8-98me-x3dw"
                        },
                        {
                            "vulnerability": "VCID-apqw-e2px-yka5"
                        },
                        {
                            "vulnerability": "VCID-b4ty-d775-5fed"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-bpht-9daq-rfgd"
                        },
                        {
                            "vulnerability": "VCID-fskg-j9fe-6yeg"
                        },
                        {
                            "vulnerability": "VCID-hfsk-4cbd-m3b1"
                        },
                        {
                            "vulnerability": "VCID-kkwp-2x9m-9bgd"
                        },
                        {
                            "vulnerability": "VCID-q2d9-vahb-6qce"
                        },
                        {
                            "vulnerability": "VCID-r7va-6j6s-rba5"
                        },
                        {
                            "vulnerability": "VCID-w4c6-p858-rkaw"
                        },
                        {
                            "vulnerability": "VCID-wxva-f9ay-c3a2"
                        },
                        {
                            "vulnerability": "VCID-xmn1-g72k-8qcq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"
                }
            ],
            "aliases": [
                "CVE-2019-14902"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "4.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-55zj-6b4s-8ker"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48475?format=api",
            "vulnerability_id": "VCID-5vyg-1jzr-ebh8",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25718.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25718.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25718",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4183",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41592",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4167",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41671",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41895",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41923",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41755",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41805",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41815",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41838",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41806",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41793",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41842",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41743",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25718"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019726",
                    "reference_id": "2019726",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019726"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2538",
                    "reference_id": "AVG-2538",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2538"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5142-1/",
                    "reference_id": "USN-5142-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5142-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18xs-py1v-xfey"
                        },
                        {
                            "vulnerability": "VCID-28rq-1d68-4bfz"
                        },
                        {
                            "vulnerability": "VCID-2w26-yjmn-k7an"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5cd3-497h-qkhw"
                        },
                        {
                            "vulnerability": "VCID-68zz-z589-87f6"
                        },
                        {
                            "vulnerability": "VCID-6mju-nwzy-pqeq"
                        },
                        {
                            "vulnerability": "VCID-745n-wca7-d7fh"
                        },
                        {
                            "vulnerability": "VCID-7xdg-sn88-bkbs"
                        },
                        {
                            "vulnerability": "VCID-84q8-2457-qkc5"
                        },
                        {
                            "vulnerability": "VCID-94k8-98me-x3dw"
                        },
                        {
                            "vulnerability": "VCID-apqw-e2px-yka5"
                        },
                        {
                            "vulnerability": "VCID-b4ty-d775-5fed"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-bpht-9daq-rfgd"
                        },
                        {
                            "vulnerability": "VCID-fskg-j9fe-6yeg"
                        },
                        {
                            "vulnerability": "VCID-hfsk-4cbd-m3b1"
                        },
                        {
                            "vulnerability": "VCID-kkwp-2x9m-9bgd"
                        },
                        {
                            "vulnerability": "VCID-q2d9-vahb-6qce"
                        },
                        {
                            "vulnerability": "VCID-r7va-6j6s-rba5"
                        },
                        {
                            "vulnerability": "VCID-w4c6-p858-rkaw"
                        },
                        {
                            "vulnerability": "VCID-wxva-f9ay-c3a2"
                        },
                        {
                            "vulnerability": "VCID-xmn1-g72k-8qcq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"
                }
            ],
            "aliases": [
                "CVE-2020-25718"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5vyg-1jzr-ebh8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47171?format=api",
            "vulnerability_id": "VCID-76sz-d2yt-buek",
            "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14383.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14383.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14383",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00465",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64258",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00465",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64316",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00465",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64408",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00465",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64336",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00465",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64372",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00465",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64383",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00465",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64375",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00465",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64395",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00465",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64344",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00465",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64301",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00465",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64349",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00465",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64364",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00465",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64377",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00465",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64365",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14383"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14383",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14383"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892636",
                    "reference_id": "1892636",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T15:10:17Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892636"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973398",
                    "reference_id": "973398",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973398"
                },
                {
                    "reference_url": "https://www.samba.org/samba/security/CVE-2020-14383.html",
                    "reference_id": "CVE-2020-14383.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T15:10:17Z/"
                        }
                    ],
                    "url": "https://www.samba.org/samba/security/CVE-2020-14383.html"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202012-24",
                    "reference_id": "GLSA-202012-24",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T15:10:17Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202012-24"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html",
                    "reference_id": "msg00015.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T15:10:17Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4611-1/",
                    "reference_id": "USN-4611-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4611-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4931-1/",
                    "reference_id": "USN-4931-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4931-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18xs-py1v-xfey"
                        },
                        {
                            "vulnerability": "VCID-28rq-1d68-4bfz"
                        },
                        {
                            "vulnerability": "VCID-2w26-yjmn-k7an"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5cd3-497h-qkhw"
                        },
                        {
                            "vulnerability": "VCID-68zz-z589-87f6"
                        },
                        {
                            "vulnerability": "VCID-6mju-nwzy-pqeq"
                        },
                        {
                            "vulnerability": "VCID-745n-wca7-d7fh"
                        },
                        {
                            "vulnerability": "VCID-7xdg-sn88-bkbs"
                        },
                        {
                            "vulnerability": "VCID-84q8-2457-qkc5"
                        },
                        {
                            "vulnerability": "VCID-94k8-98me-x3dw"
                        },
                        {
                            "vulnerability": "VCID-apqw-e2px-yka5"
                        },
                        {
                            "vulnerability": "VCID-b4ty-d775-5fed"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-bpht-9daq-rfgd"
                        },
                        {
                            "vulnerability": "VCID-fskg-j9fe-6yeg"
                        },
                        {
                            "vulnerability": "VCID-hfsk-4cbd-m3b1"
                        },
                        {
                            "vulnerability": "VCID-kkwp-2x9m-9bgd"
                        },
                        {
                            "vulnerability": "VCID-q2d9-vahb-6qce"
                        },
                        {
                            "vulnerability": "VCID-r7va-6j6s-rba5"
                        },
                        {
                            "vulnerability": "VCID-w4c6-p858-rkaw"
                        },
                        {
                            "vulnerability": "VCID-wxva-f9ay-c3a2"
                        },
                        {
                            "vulnerability": "VCID-xmn1-g72k-8qcq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"
                }
            ],
            "aliases": [
                "CVE-2020-14383"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-76sz-d2yt-buek"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48485?format=api",
            "vulnerability_id": "VCID-7bb1-3ny6-rbbv",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44142.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44142.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-44142",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.30651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96699",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.30651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96687",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.30651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96697",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.32269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96831",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.32269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96823",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.37405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97198",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.37405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97175",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.37405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97179",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.37405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9718",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.37405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97181",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.37405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97188",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.37405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97191",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.37405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97195",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.37405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97197",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-44142"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44142",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44142"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004693",
                    "reference_id": "1004693",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004693"
                },
                {
                    "reference_url": "https://kb.cert.org/vuls/id/119678",
                    "reference_id": "119678",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:30:59Z/"
                        }
                    ],
                    "url": "https://kb.cert.org/vuls/id/119678"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046146",
                    "reference_id": "2046146",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046146"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2648",
                    "reference_id": "AVG-2648",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2648"
                },
                {
                    "reference_url": "https://www.zerodayinitiative.com/blog/2022/2/1/cve-2021-44142-details-on-a-samba-code-execution-bug-demonstrated-at-pwn2own-austin",
                    "reference_id": "cve-2021-44142-details-on-a-samba-code-execution-bug-demonstrated-at-pwn2own-austin",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:30:59Z/"
                        }
                    ],
                    "url": "https://www.zerodayinitiative.com/blog/2022/2/1/cve-2021-44142-details-on-a-samba-code-execution-bug-demonstrated-at-pwn2own-austin"
                },
                {
                    "reference_url": "https://www.samba.org/samba/security/CVE-2021-44142.html",
                    "reference_id": "CVE-2021-44142.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:30:59Z/"
                        }
                    ],
                    "url": "https://www.samba.org/samba/security/CVE-2021-44142.html"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:30:59Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0328",
                    "reference_id": "RHSA-2022:0328",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0328"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0329",
                    "reference_id": "RHSA-2022:0329",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0329"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0330",
                    "reference_id": "RHSA-2022:0330",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0330"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0331",
                    "reference_id": "RHSA-2022:0331",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0331"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0332",
                    "reference_id": "RHSA-2022:0332",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0332"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0457",
                    "reference_id": "RHSA-2022:0457",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0457"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0458",
                    "reference_id": "RHSA-2022:0458",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0458"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0663",
                    "reference_id": "RHSA-2022:0663",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0663"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0664",
                    "reference_id": "RHSA-2022:0664",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0664"
                },
                {
                    "reference_url": "https://bugzilla.samba.org/show_bug.cgi?id=14914",
                    "reference_id": "show_bug.cgi?id=14914",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:30:59Z/"
                        }
                    ],
                    "url": "https://bugzilla.samba.org/show_bug.cgi?id=14914"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5260-1/",
                    "reference_id": "USN-5260-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5260-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5260-2/",
                    "reference_id": "USN-5260-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5260-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5260-3/",
                    "reference_id": "USN-5260-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5260-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1038160?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.9.5%2Bdfsg-5%2Bdeb10u3",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2dm7-xt4e-wkex"
                        },
                        {
                            "vulnerability": "VCID-2gkd-vubu-j7fd"
                        },
                        {
                            "vulnerability": "VCID-47k4-8k1s-zff2"
                        },
                        {
                            "vulnerability": "VCID-4qm6-a9un-nyda"
                        },
                        {
                            "vulnerability": "VCID-55zj-6b4s-8ker"
                        },
                        {
                            "vulnerability": "VCID-5vyg-1jzr-ebh8"
                        },
                        {
                            "vulnerability": "VCID-745n-wca7-d7fh"
                        },
                        {
                            "vulnerability": "VCID-76sz-d2yt-buek"
                        },
                        {
                            "vulnerability": "VCID-7bb1-3ny6-rbbv"
                        },
                        {
                            "vulnerability": "VCID-88mw-c7mc-jugp"
                        },
                        {
                            "vulnerability": "VCID-9cyh-d77a-vyhj"
                        },
                        {
                            "vulnerability": "VCID-9t1m-6chr-e3dt"
                        },
                        {
                            "vulnerability": "VCID-cgez-urtv-qbhq"
                        },
                        {
                            "vulnerability": "VCID-crh2-zv3e-pfaa"
                        },
                        {
                            "vulnerability": "VCID-ez9s-vn2t-w7a6"
                        },
                        {
                            "vulnerability": "VCID-ezk6-jy86-y3h4"
                        },
                        {
                            "vulnerability": "VCID-f772-3dtd-wba8"
                        },
                        {
                            "vulnerability": "VCID-f9hv-k2xk-puhq"
                        },
                        {
                            "vulnerability": "VCID-fh3j-efv1-tybp"
                        },
                        {
                            "vulnerability": "VCID-frnd-3wwy-93ek"
                        },
                        {
                            "vulnerability": "VCID-gs98-hcdd-2yf9"
                        },
                        {
                            "vulnerability": "VCID-hnhm-ud2a-nugz"
                        },
                        {
                            "vulnerability": "VCID-hzy4-16j5-8qcf"
                        },
                        {
                            "vulnerability": "VCID-m44e-rw2w-vuhj"
                        },
                        {
                            "vulnerability": "VCID-mgaq-qjdw-fke4"
                        },
                        {
                            "vulnerability": "VCID-mw6j-fkm4-pkg2"
                        },
                        {
                            "vulnerability": "VCID-p1se-92ae-t3b5"
                        },
                        {
                            "vulnerability": "VCID-qt4e-73xg-bqde"
                        },
                        {
                            "vulnerability": "VCID-rgu3-rgej-aucp"
                        },
                        {
                            "vulnerability": "VCID-rnfg-1cgy-jbaq"
                        },
                        {
                            "vulnerability": "VCID-rphh-hzna-nbgf"
                        },
                        {
                            "vulnerability": "VCID-s2ne-rcp3-nbgz"
                        },
                        {
                            "vulnerability": "VCID-s6ma-9h2y-hyc4"
                        },
                        {
                            "vulnerability": "VCID-smxs-4de1-nfec"
                        },
                        {
                            "vulnerability": "VCID-t3zy-v34p-7uen"
                        },
                        {
                            "vulnerability": "VCID-tk1x-bex4-8kbz"
                        },
                        {
                            "vulnerability": "VCID-vg7n-k8px-ayd5"
                        },
                        {
                            "vulnerability": "VCID-vnc5-neuk-m3ar"
                        },
                        {
                            "vulnerability": "VCID-vu43-fq85-a7eq"
                        },
                        {
                            "vulnerability": "VCID-wfhc-ehpe-abaq"
                        },
                        {
                            "vulnerability": "VCID-ws2g-8ye2-pkdk"
                        },
                        {
                            "vulnerability": "VCID-xwke-mduk-kyga"
                        },
                        {
                            "vulnerability": "VCID-xyfs-p969-syfp"
                        },
                        {
                            "vulnerability": "VCID-ycau-9h17-quf3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-5%252Bdeb10u3"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18xs-py1v-xfey"
                        },
                        {
                            "vulnerability": "VCID-28rq-1d68-4bfz"
                        },
                        {
                            "vulnerability": "VCID-2w26-yjmn-k7an"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5cd3-497h-qkhw"
                        },
                        {
                            "vulnerability": "VCID-68zz-z589-87f6"
                        },
                        {
                            "vulnerability": "VCID-6mju-nwzy-pqeq"
                        },
                        {
                            "vulnerability": "VCID-745n-wca7-d7fh"
                        },
                        {
                            "vulnerability": "VCID-7xdg-sn88-bkbs"
                        },
                        {
                            "vulnerability": "VCID-84q8-2457-qkc5"
                        },
                        {
                            "vulnerability": "VCID-94k8-98me-x3dw"
                        },
                        {
                            "vulnerability": "VCID-apqw-e2px-yka5"
                        },
                        {
                            "vulnerability": "VCID-b4ty-d775-5fed"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-bpht-9daq-rfgd"
                        },
                        {
                            "vulnerability": "VCID-fskg-j9fe-6yeg"
                        },
                        {
                            "vulnerability": "VCID-hfsk-4cbd-m3b1"
                        },
                        {
                            "vulnerability": "VCID-kkwp-2x9m-9bgd"
                        },
                        {
                            "vulnerability": "VCID-q2d9-vahb-6qce"
                        },
                        {
                            "vulnerability": "VCID-r7va-6j6s-rba5"
                        },
                        {
                            "vulnerability": "VCID-w4c6-p858-rkaw"
                        },
                        {
                            "vulnerability": "VCID-wxva-f9ay-c3a2"
                        },
                        {
                            "vulnerability": "VCID-xmn1-g72k-8qcq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"
                }
            ],
            "aliases": [
                "CVE-2021-44142"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7bb1-3ny6-rbbv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47170?format=api",
            "vulnerability_id": "VCID-88mw-c7mc-jugp",
            "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14323.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14323.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62077",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6191",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61983",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62015",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61985",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62034",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62051",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62072",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62061",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6204",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62082",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62088",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6207",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62067",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62084",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14323"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14323"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891685",
                    "reference_id": "1891685",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T20:46:57Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891685"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973399",
                    "reference_id": "973399",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973399"
                },
                {
                    "reference_url": "https://www.samba.org/samba/security/CVE-2020-14323.html",
                    "reference_id": "CVE-2020-14323.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T20:46:57Z/"
                        }
                    ],
                    "url": "https://www.samba.org/samba/security/CVE-2020-14323.html"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202012-24",
                    "reference_id": "GLSA-202012-24",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T20:46:57Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202012-24"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JE2M4FE3N3EDXVG4UKSVFPL7SQUGFFDP/",
                    "reference_id": "JE2M4FE3N3EDXVG4UKSVFPL7SQUGFFDP",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T20:46:57Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JE2M4FE3N3EDXVG4UKSVFPL7SQUGFFDP/"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00008.html",
                    "reference_id": "msg00008.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T20:46:57Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00008.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00012.html",
                    "reference_id": "msg00012.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T20:46:57Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00012.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html",
                    "reference_id": "msg00015.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T20:46:57Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html",
                    "reference_id": "msg00041.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T20:46:57Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20201103-0001/",
                    "reference_id": "ntap-20201103-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T20:46:57Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20201103-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5439",
                    "reference_id": "RHSA-2020:5439",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5439"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1647",
                    "reference_id": "RHSA-2021:1647",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1647"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3723",
                    "reference_id": "RHSA-2021:3723",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3723"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4611-1/",
                    "reference_id": "USN-4611-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4611-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4931-1/",
                    "reference_id": "USN-4931-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4931-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6HM73N4NEGFW5GIJJGGP6ZZBS6GTXPB/",
                    "reference_id": "W6HM73N4NEGFW5GIJJGGP6ZZBS6GTXPB",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T20:46:57Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6HM73N4NEGFW5GIJJGGP6ZZBS6GTXPB/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18xs-py1v-xfey"
                        },
                        {
                            "vulnerability": "VCID-28rq-1d68-4bfz"
                        },
                        {
                            "vulnerability": "VCID-2w26-yjmn-k7an"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5cd3-497h-qkhw"
                        },
                        {
                            "vulnerability": "VCID-68zz-z589-87f6"
                        },
                        {
                            "vulnerability": "VCID-6mju-nwzy-pqeq"
                        },
                        {
                            "vulnerability": "VCID-745n-wca7-d7fh"
                        },
                        {
                            "vulnerability": "VCID-7xdg-sn88-bkbs"
                        },
                        {
                            "vulnerability": "VCID-84q8-2457-qkc5"
                        },
                        {
                            "vulnerability": "VCID-94k8-98me-x3dw"
                        },
                        {
                            "vulnerability": "VCID-apqw-e2px-yka5"
                        },
                        {
                            "vulnerability": "VCID-b4ty-d775-5fed"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-bpht-9daq-rfgd"
                        },
                        {
                            "vulnerability": "VCID-fskg-j9fe-6yeg"
                        },
                        {
                            "vulnerability": "VCID-hfsk-4cbd-m3b1"
                        },
                        {
                            "vulnerability": "VCID-kkwp-2x9m-9bgd"
                        },
                        {
                            "vulnerability": "VCID-q2d9-vahb-6qce"
                        },
                        {
                            "vulnerability": "VCID-r7va-6j6s-rba5"
                        },
                        {
                            "vulnerability": "VCID-w4c6-p858-rkaw"
                        },
                        {
                            "vulnerability": "VCID-wxva-f9ay-c3a2"
                        },
                        {
                            "vulnerability": "VCID-xmn1-g72k-8qcq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"
                }
            ],
            "aliases": [
                "CVE-2020-14323"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-88mw-c7mc-jugp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/45506?format=api",
            "vulnerability_id": "VCID-9cyh-d77a-vyhj",
            "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20254.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20254.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20254",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01764",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82549",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01764",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82697",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01764",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82681",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01764",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82691",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01764",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82564",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01764",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8258",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01764",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82576",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01764",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82602",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01764",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8261",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01764",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82628",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01764",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82622",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01764",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82618",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01764",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82655",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01764",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82656",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01764",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8266",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20254"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20254",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20254"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1949442",
                    "reference_id": "1949442",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1949442"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987811",
                    "reference_id": "987811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987811"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1893",
                    "reference_id": "AVG-1893",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1893"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-22",
                    "reference_id": "GLSA-202105-22",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202105-22"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2313",
                    "reference_id": "RHSA-2021:2313",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2313"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3723",
                    "reference_id": "RHSA-2021:3723",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3723"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3724",
                    "reference_id": "RHSA-2021:3724",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3724"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3988",
                    "reference_id": "RHSA-2021:3988",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3988"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4058",
                    "reference_id": "RHSA-2021:4058",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4058"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4866",
                    "reference_id": "RHSA-2021:4866",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4866"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4930-1/",
                    "reference_id": "USN-4930-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4930-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4931-1/",
                    "reference_id": "USN-4931-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4931-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18xs-py1v-xfey"
                        },
                        {
                            "vulnerability": "VCID-28rq-1d68-4bfz"
                        },
                        {
                            "vulnerability": "VCID-2w26-yjmn-k7an"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5cd3-497h-qkhw"
                        },
                        {
                            "vulnerability": "VCID-68zz-z589-87f6"
                        },
                        {
                            "vulnerability": "VCID-6mju-nwzy-pqeq"
                        },
                        {
                            "vulnerability": "VCID-745n-wca7-d7fh"
                        },
                        {
                            "vulnerability": "VCID-7xdg-sn88-bkbs"
                        },
                        {
                            "vulnerability": "VCID-84q8-2457-qkc5"
                        },
                        {
                            "vulnerability": "VCID-94k8-98me-x3dw"
                        },
                        {
                            "vulnerability": "VCID-apqw-e2px-yka5"
                        },
                        {
                            "vulnerability": "VCID-b4ty-d775-5fed"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-bpht-9daq-rfgd"
                        },
                        {
                            "vulnerability": "VCID-fskg-j9fe-6yeg"
                        },
                        {
                            "vulnerability": "VCID-hfsk-4cbd-m3b1"
                        },
                        {
                            "vulnerability": "VCID-kkwp-2x9m-9bgd"
                        },
                        {
                            "vulnerability": "VCID-q2d9-vahb-6qce"
                        },
                        {
                            "vulnerability": "VCID-r7va-6j6s-rba5"
                        },
                        {
                            "vulnerability": "VCID-w4c6-p858-rkaw"
                        },
                        {
                            "vulnerability": "VCID-wxva-f9ay-c3a2"
                        },
                        {
                            "vulnerability": "VCID-xmn1-g72k-8qcq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"
                }
            ],
            "aliases": [
                "CVE-2021-20254"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9cyh-d77a-vyhj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/44833?format=api",
            "vulnerability_id": "VCID-9t1m-6chr-e3dt",
            "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10745.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10745.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-10745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.19658",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95388",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.19658",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95441",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.19658",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95439",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.19658",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9544",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.19658",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95397",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.19658",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95403",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.19658",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95406",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.19658",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95413",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.19658",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95416",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.19658",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95421",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.19658",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95423",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.19658",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95431",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.19658",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95435",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-10745"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10745"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1849491",
                    "reference_id": "1849491",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1849491"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1202",
                    "reference_id": "AVG-1202",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1202"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202007-15",
                    "reference_id": "GLSA-202007-15",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202007-15"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4409-1/",
                    "reference_id": "USN-4409-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4409-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18xs-py1v-xfey"
                        },
                        {
                            "vulnerability": "VCID-28rq-1d68-4bfz"
                        },
                        {
                            "vulnerability": "VCID-2w26-yjmn-k7an"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5cd3-497h-qkhw"
                        },
                        {
                            "vulnerability": "VCID-68zz-z589-87f6"
                        },
                        {
                            "vulnerability": "VCID-6mju-nwzy-pqeq"
                        },
                        {
                            "vulnerability": "VCID-745n-wca7-d7fh"
                        },
                        {
                            "vulnerability": "VCID-7xdg-sn88-bkbs"
                        },
                        {
                            "vulnerability": "VCID-84q8-2457-qkc5"
                        },
                        {
                            "vulnerability": "VCID-94k8-98me-x3dw"
                        },
                        {
                            "vulnerability": "VCID-apqw-e2px-yka5"
                        },
                        {
                            "vulnerability": "VCID-b4ty-d775-5fed"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-bpht-9daq-rfgd"
                        },
                        {
                            "vulnerability": "VCID-fskg-j9fe-6yeg"
                        },
                        {
                            "vulnerability": "VCID-hfsk-4cbd-m3b1"
                        },
                        {
                            "vulnerability": "VCID-kkwp-2x9m-9bgd"
                        },
                        {
                            "vulnerability": "VCID-q2d9-vahb-6qce"
                        },
                        {
                            "vulnerability": "VCID-r7va-6j6s-rba5"
                        },
                        {
                            "vulnerability": "VCID-w4c6-p858-rkaw"
                        },
                        {
                            "vulnerability": "VCID-wxva-f9ay-c3a2"
                        },
                        {
                            "vulnerability": "VCID-xmn1-g72k-8qcq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"
                }
            ],
            "aliases": [
                "CVE-2020-10745"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9t1m-6chr-e3dt"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46968?format=api",
            "vulnerability_id": "VCID-cgez-urtv-qbhq",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which can lead to remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34967.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34967.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34967",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.18271",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95225",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.18271",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95222",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.21174",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95637",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.21174",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95645",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.21174",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95653",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.21174",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95657",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.21174",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95662",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.21174",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95661",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.21174",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95664",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.21174",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95672",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.21174",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95676",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.21174",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95642",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34967"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222794",
                    "reference_id": "2222794",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222794"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-28",
                    "reference_id": "GLSA-202402-28",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-28"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6667",
                    "reference_id": "RHSA-2023:6667",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6667"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7139",
                    "reference_id": "RHSA-2023:7139",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7139"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0423",
                    "reference_id": "RHSA-2024:0423",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0423"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0580",
                    "reference_id": "RHSA-2024:0580",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0580"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6238-1/",
                    "reference_id": "USN-6238-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6238-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18xs-py1v-xfey"
                        },
                        {
                            "vulnerability": "VCID-28rq-1d68-4bfz"
                        },
                        {
                            "vulnerability": "VCID-2w26-yjmn-k7an"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5cd3-497h-qkhw"
                        },
                        {
                            "vulnerability": "VCID-68zz-z589-87f6"
                        },
                        {
                            "vulnerability": "VCID-6mju-nwzy-pqeq"
                        },
                        {
                            "vulnerability": "VCID-745n-wca7-d7fh"
                        },
                        {
                            "vulnerability": "VCID-7xdg-sn88-bkbs"
                        },
                        {
                            "vulnerability": "VCID-84q8-2457-qkc5"
                        },
                        {
                            "vulnerability": "VCID-94k8-98me-x3dw"
                        },
                        {
                            "vulnerability": "VCID-apqw-e2px-yka5"
                        },
                        {
                            "vulnerability": "VCID-b4ty-d775-5fed"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-bpht-9daq-rfgd"
                        },
                        {
                            "vulnerability": "VCID-fskg-j9fe-6yeg"
                        },
                        {
                            "vulnerability": "VCID-hfsk-4cbd-m3b1"
                        },
                        {
                            "vulnerability": "VCID-kkwp-2x9m-9bgd"
                        },
                        {
                            "vulnerability": "VCID-q2d9-vahb-6qce"
                        },
                        {
                            "vulnerability": "VCID-r7va-6j6s-rba5"
                        },
                        {
                            "vulnerability": "VCID-w4c6-p858-rkaw"
                        },
                        {
                            "vulnerability": "VCID-wxva-f9ay-c3a2"
                        },
                        {
                            "vulnerability": "VCID-xmn1-g72k-8qcq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"
                }
            ],
            "aliases": [
                "CVE-2023-34967"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cgez-urtv-qbhq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47967?format=api",
            "vulnerability_id": "VCID-crh2-zv3e-pfaa",
            "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n    which could lead to remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14907.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14907.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14907",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.10242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93119",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.10242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93129",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.10242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93132",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.10242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93131",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.10242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9314",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.10242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93144",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.10242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9315",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.10242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93147",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.10242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93148",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.10242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93165",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.10242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93169",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.10242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93177",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.10242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93182",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.10242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93181",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.10242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93178",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14907"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14907",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14907"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1791207",
                    "reference_id": "1791207",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1791207"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202003-52",
                    "reference_id": "GLSA-202003-52",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202003-52"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:0943",
                    "reference_id": "RHSA-2020:0943",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:0943"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1878",
                    "reference_id": "RHSA-2020:1878",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1878"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3981",
                    "reference_id": "RHSA-2020:3981",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3981"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4244-1/",
                    "reference_id": "USN-4244-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4244-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18xs-py1v-xfey"
                        },
                        {
                            "vulnerability": "VCID-28rq-1d68-4bfz"
                        },
                        {
                            "vulnerability": "VCID-2w26-yjmn-k7an"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5cd3-497h-qkhw"
                        },
                        {
                            "vulnerability": "VCID-68zz-z589-87f6"
                        },
                        {
                            "vulnerability": "VCID-6mju-nwzy-pqeq"
                        },
                        {
                            "vulnerability": "VCID-745n-wca7-d7fh"
                        },
                        {
                            "vulnerability": "VCID-7xdg-sn88-bkbs"
                        },
                        {
                            "vulnerability": "VCID-84q8-2457-qkc5"
                        },
                        {
                            "vulnerability": "VCID-94k8-98me-x3dw"
                        },
                        {
                            "vulnerability": "VCID-apqw-e2px-yka5"
                        },
                        {
                            "vulnerability": "VCID-b4ty-d775-5fed"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-bpht-9daq-rfgd"
                        },
                        {
                            "vulnerability": "VCID-fskg-j9fe-6yeg"
                        },
                        {
                            "vulnerability": "VCID-hfsk-4cbd-m3b1"
                        },
                        {
                            "vulnerability": "VCID-kkwp-2x9m-9bgd"
                        },
                        {
                            "vulnerability": "VCID-q2d9-vahb-6qce"
                        },
                        {
                            "vulnerability": "VCID-r7va-6j6s-rba5"
                        },
                        {
                            "vulnerability": "VCID-w4c6-p858-rkaw"
                        },
                        {
                            "vulnerability": "VCID-wxva-f9ay-c3a2"
                        },
                        {
                            "vulnerability": "VCID-xmn1-g72k-8qcq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"
                }
            ],
            "aliases": [
                "CVE-2019-14907"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-crh2-zv3e-pfaa"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46969?format=api",
            "vulnerability_id": "VCID-ez9s-vn2t-w7a6",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which can lead to remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34968.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34968.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34968",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02202",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84491",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.02202",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84452",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02202",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84478",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02202",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84487",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02387",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84969",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02387",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84999",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02387",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85015",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02387",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85013",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02387",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8501",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02387",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85031",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02387",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85033",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02387",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84992",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02387",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84947",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02387",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84965",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34968"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222795",
                    "reference_id": "2222795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222795"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-28",
                    "reference_id": "GLSA-202402-28",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-28"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6667",
                    "reference_id": "RHSA-2023:6667",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6667"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7139",
                    "reference_id": "RHSA-2023:7139",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7139"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0423",
                    "reference_id": "RHSA-2024:0423",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0423"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0580",
                    "reference_id": "RHSA-2024:0580",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0580"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6238-1/",
                    "reference_id": "USN-6238-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6238-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18xs-py1v-xfey"
                        },
                        {
                            "vulnerability": "VCID-28rq-1d68-4bfz"
                        },
                        {
                            "vulnerability": "VCID-2w26-yjmn-k7an"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5cd3-497h-qkhw"
                        },
                        {
                            "vulnerability": "VCID-68zz-z589-87f6"
                        },
                        {
                            "vulnerability": "VCID-6mju-nwzy-pqeq"
                        },
                        {
                            "vulnerability": "VCID-745n-wca7-d7fh"
                        },
                        {
                            "vulnerability": "VCID-7xdg-sn88-bkbs"
                        },
                        {
                            "vulnerability": "VCID-84q8-2457-qkc5"
                        },
                        {
                            "vulnerability": "VCID-94k8-98me-x3dw"
                        },
                        {
                            "vulnerability": "VCID-apqw-e2px-yka5"
                        },
                        {
                            "vulnerability": "VCID-b4ty-d775-5fed"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-bpht-9daq-rfgd"
                        },
                        {
                            "vulnerability": "VCID-fskg-j9fe-6yeg"
                        },
                        {
                            "vulnerability": "VCID-hfsk-4cbd-m3b1"
                        },
                        {
                            "vulnerability": "VCID-kkwp-2x9m-9bgd"
                        },
                        {
                            "vulnerability": "VCID-q2d9-vahb-6qce"
                        },
                        {
                            "vulnerability": "VCID-r7va-6j6s-rba5"
                        },
                        {
                            "vulnerability": "VCID-w4c6-p858-rkaw"
                        },
                        {
                            "vulnerability": "VCID-wxva-f9ay-c3a2"
                        },
                        {
                            "vulnerability": "VCID-xmn1-g72k-8qcq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"
                }
            ],
            "aliases": [
                "CVE-2023-34968"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ez9s-vn2t-w7a6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48472?format=api",
            "vulnerability_id": "VCID-ezk6-jy86-y3h4",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2124.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2124.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2124",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00699",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72052",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00699",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71974",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00699",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72015",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00699",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72022",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00699",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72007",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00699",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72051",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00699",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72057",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00699",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71931",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00699",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7197",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00699",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71982",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00699",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72006",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00699",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71989",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00814",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74225",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00814",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74252",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00814",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7422",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2124"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:A/AC:M/Au:N/C:P/I:N/A:N"
                        },
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019660",
                    "reference_id": "2019660",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019660"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2539",
                    "reference_id": "AVG-2539",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2539"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4843",
                    "reference_id": "RHSA-2021:4843",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4843"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4844",
                    "reference_id": "RHSA-2021:4844",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4844"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5082",
                    "reference_id": "RHSA-2021:5082",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5082"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5192",
                    "reference_id": "RHSA-2021:5192",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5192"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0008",
                    "reference_id": "RHSA-2022:0008",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0008"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0074",
                    "reference_id": "RHSA-2022:0074",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0074"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5142-1/",
                    "reference_id": "USN-5142-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5142-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5174-1/",
                    "reference_id": "USN-5174-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5174-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18xs-py1v-xfey"
                        },
                        {
                            "vulnerability": "VCID-28rq-1d68-4bfz"
                        },
                        {
                            "vulnerability": "VCID-2w26-yjmn-k7an"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5cd3-497h-qkhw"
                        },
                        {
                            "vulnerability": "VCID-68zz-z589-87f6"
                        },
                        {
                            "vulnerability": "VCID-6mju-nwzy-pqeq"
                        },
                        {
                            "vulnerability": "VCID-745n-wca7-d7fh"
                        },
                        {
                            "vulnerability": "VCID-7xdg-sn88-bkbs"
                        },
                        {
                            "vulnerability": "VCID-84q8-2457-qkc5"
                        },
                        {
                            "vulnerability": "VCID-94k8-98me-x3dw"
                        },
                        {
                            "vulnerability": "VCID-apqw-e2px-yka5"
                        },
                        {
                            "vulnerability": "VCID-b4ty-d775-5fed"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-bpht-9daq-rfgd"
                        },
                        {
                            "vulnerability": "VCID-fskg-j9fe-6yeg"
                        },
                        {
                            "vulnerability": "VCID-hfsk-4cbd-m3b1"
                        },
                        {
                            "vulnerability": "VCID-kkwp-2x9m-9bgd"
                        },
                        {
                            "vulnerability": "VCID-q2d9-vahb-6qce"
                        },
                        {
                            "vulnerability": "VCID-r7va-6j6s-rba5"
                        },
                        {
                            "vulnerability": "VCID-w4c6-p858-rkaw"
                        },
                        {
                            "vulnerability": "VCID-wxva-f9ay-c3a2"
                        },
                        {
                            "vulnerability": "VCID-xmn1-g72k-8qcq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"
                }
            ],
            "aliases": [
                "CVE-2016-2124"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ezk6-jy86-y3h4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48493?format=api",
            "vulnerability_id": "VCID-f772-3dtd-wba8",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32742.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32742.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32742",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00272",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50607",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00574",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68802",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00574",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68754",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00574",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6874",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00574",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68711",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00574",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68753",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00574",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68764",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00574",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68742",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00574",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6879",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00574",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68796",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00574",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68685",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00574",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68662",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00574",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68714",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00574",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68732",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32742"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449",
                    "reference_id": "1016449",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108196",
                    "reference_id": "2108196",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108196"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2782",
                    "reference_id": "AVG-2782",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2782"
                },
                {
                    "reference_url": "https://www.samba.org/samba/security/CVE-2022-32742.html",
                    "reference_id": "CVE-2022-32742.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T19:44:06Z/"
                        }
                    ],
                    "url": "https://www.samba.org/samba/security/CVE-2022-32742.html"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T19:44:06Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html",
                    "reference_id": "msg00015.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T19:44:06Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7056",
                    "reference_id": "RHSA-2022:7056",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7056"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7111",
                    "reference_id": "RHSA-2022:7111",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7111"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8317",
                    "reference_id": "RHSA-2022:8317",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8317"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5542-1/",
                    "reference_id": "USN-5542-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5542-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18xs-py1v-xfey"
                        },
                        {
                            "vulnerability": "VCID-28rq-1d68-4bfz"
                        },
                        {
                            "vulnerability": "VCID-2w26-yjmn-k7an"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5cd3-497h-qkhw"
                        },
                        {
                            "vulnerability": "VCID-68zz-z589-87f6"
                        },
                        {
                            "vulnerability": "VCID-6mju-nwzy-pqeq"
                        },
                        {
                            "vulnerability": "VCID-745n-wca7-d7fh"
                        },
                        {
                            "vulnerability": "VCID-7xdg-sn88-bkbs"
                        },
                        {
                            "vulnerability": "VCID-84q8-2457-qkc5"
                        },
                        {
                            "vulnerability": "VCID-94k8-98me-x3dw"
                        },
                        {
                            "vulnerability": "VCID-apqw-e2px-yka5"
                        },
                        {
                            "vulnerability": "VCID-b4ty-d775-5fed"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-bpht-9daq-rfgd"
                        },
                        {
                            "vulnerability": "VCID-fskg-j9fe-6yeg"
                        },
                        {
                            "vulnerability": "VCID-hfsk-4cbd-m3b1"
                        },
                        {
                            "vulnerability": "VCID-kkwp-2x9m-9bgd"
                        },
                        {
                            "vulnerability": "VCID-q2d9-vahb-6qce"
                        },
                        {
                            "vulnerability": "VCID-r7va-6j6s-rba5"
                        },
                        {
                            "vulnerability": "VCID-w4c6-p858-rkaw"
                        },
                        {
                            "vulnerability": "VCID-wxva-f9ay-c3a2"
                        },
                        {
                            "vulnerability": "VCID-xmn1-g72k-8qcq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"
                }
            ],
            "aliases": [
                "CVE-2022-32742"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f772-3dtd-wba8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48476?format=api",
            "vulnerability_id": "VCID-f9hv-k2xk-puhq",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25719.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25719.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25719",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00213",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43692",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00213",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43893",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00213",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43885",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00213",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43818",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00213",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4377",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00213",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43773",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00213",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43809",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00213",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43859",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00213",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43862",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00213",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4388",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00213",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43848",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00213",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43831",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00248",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4808",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00248",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48101",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00248",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48042",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25719"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019732",
                    "reference_id": "2019732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019732"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2538",
                    "reference_id": "AVG-2538",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2538"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5142",
                    "reference_id": "RHSA-2021:5142",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5142"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5195",
                    "reference_id": "RHSA-2021:5195",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5195"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0007",
                    "reference_id": "RHSA-2022:0007",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0007"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0076",
                    "reference_id": "RHSA-2022:0076",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0076"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5142-1/",
                    "reference_id": "USN-5142-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5142-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18xs-py1v-xfey"
                        },
                        {
                            "vulnerability": "VCID-28rq-1d68-4bfz"
                        },
                        {
                            "vulnerability": "VCID-2w26-yjmn-k7an"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5cd3-497h-qkhw"
                        },
                        {
                            "vulnerability": "VCID-68zz-z589-87f6"
                        },
                        {
                            "vulnerability": "VCID-6mju-nwzy-pqeq"
                        },
                        {
                            "vulnerability": "VCID-745n-wca7-d7fh"
                        },
                        {
                            "vulnerability": "VCID-7xdg-sn88-bkbs"
                        },
                        {
                            "vulnerability": "VCID-84q8-2457-qkc5"
                        },
                        {
                            "vulnerability": "VCID-94k8-98me-x3dw"
                        },
                        {
                            "vulnerability": "VCID-apqw-e2px-yka5"
                        },
                        {
                            "vulnerability": "VCID-b4ty-d775-5fed"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-bpht-9daq-rfgd"
                        },
                        {
                            "vulnerability": "VCID-fskg-j9fe-6yeg"
                        },
                        {
                            "vulnerability": "VCID-hfsk-4cbd-m3b1"
                        },
                        {
                            "vulnerability": "VCID-kkwp-2x9m-9bgd"
                        },
                        {
                            "vulnerability": "VCID-q2d9-vahb-6qce"
                        },
                        {
                            "vulnerability": "VCID-r7va-6j6s-rba5"
                        },
                        {
                            "vulnerability": "VCID-w4c6-p858-rkaw"
                        },
                        {
                            "vulnerability": "VCID-wxva-f9ay-c3a2"
                        },
                        {
                            "vulnerability": "VCID-xmn1-g72k-8qcq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"
                }
            ],
            "aliases": [
                "CVE-2020-25719"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f9hv-k2xk-puhq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/44825?format=api",
            "vulnerability_id": "VCID-fh3j-efv1-tybp",
            "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10700.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10700.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-10700",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86182",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86192",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86205",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86224",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86235",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8625",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86247",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86243",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8626",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86265",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86259",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86278",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86288",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-10700"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10700",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10700"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1825731",
                    "reference_id": "1825731",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1825731"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960189",
                    "reference_id": "960189",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960189"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202007-15",
                    "reference_id": "GLSA-202007-15",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202007-15"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4341-1/",
                    "reference_id": "USN-4341-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4341-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18xs-py1v-xfey"
                        },
                        {
                            "vulnerability": "VCID-28rq-1d68-4bfz"
                        },
                        {
                            "vulnerability": "VCID-2w26-yjmn-k7an"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5cd3-497h-qkhw"
                        },
                        {
                            "vulnerability": "VCID-68zz-z589-87f6"
                        },
                        {
                            "vulnerability": "VCID-6mju-nwzy-pqeq"
                        },
                        {
                            "vulnerability": "VCID-745n-wca7-d7fh"
                        },
                        {
                            "vulnerability": "VCID-7xdg-sn88-bkbs"
                        },
                        {
                            "vulnerability": "VCID-84q8-2457-qkc5"
                        },
                        {
                            "vulnerability": "VCID-94k8-98me-x3dw"
                        },
                        {
                            "vulnerability": "VCID-apqw-e2px-yka5"
                        },
                        {
                            "vulnerability": "VCID-b4ty-d775-5fed"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-bpht-9daq-rfgd"
                        },
                        {
                            "vulnerability": "VCID-fskg-j9fe-6yeg"
                        },
                        {
                            "vulnerability": "VCID-hfsk-4cbd-m3b1"
                        },
                        {
                            "vulnerability": "VCID-kkwp-2x9m-9bgd"
                        },
                        {
                            "vulnerability": "VCID-q2d9-vahb-6qce"
                        },
                        {
                            "vulnerability": "VCID-r7va-6j6s-rba5"
                        },
                        {
                            "vulnerability": "VCID-w4c6-p858-rkaw"
                        },
                        {
                            "vulnerability": "VCID-wxva-f9ay-c3a2"
                        },
                        {
                            "vulnerability": "VCID-xmn1-g72k-8qcq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"
                }
            ],
            "aliases": [
                "CVE-2020-10700"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fh3j-efv1-tybp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47964?format=api",
            "vulnerability_id": "VCID-frnd-3wwy-93ek",
            "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n    which could lead to remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14870.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14870.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14870",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89278",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89283",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89297",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.893",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89317",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89321",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8933",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89328",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89324",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89338",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.04669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89337",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.04669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89332",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.04669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8935",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.04669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89354",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.04669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89357",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14870"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14870",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14870"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778589",
                    "reference_id": "1778589",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778589"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946786",
                    "reference_id": "946786",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946786"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202003-52",
                    "reference_id": "GLSA-202003-52",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202003-52"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202310-06",
                    "reference_id": "GLSA-202310-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202310-06"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4217-1/",
                    "reference_id": "USN-4217-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4217-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4217-2/",
                    "reference_id": "USN-4217-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4217-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18xs-py1v-xfey"
                        },
                        {
                            "vulnerability": "VCID-28rq-1d68-4bfz"
                        },
                        {
                            "vulnerability": "VCID-2w26-yjmn-k7an"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5cd3-497h-qkhw"
                        },
                        {
                            "vulnerability": "VCID-68zz-z589-87f6"
                        },
                        {
                            "vulnerability": "VCID-6mju-nwzy-pqeq"
                        },
                        {
                            "vulnerability": "VCID-745n-wca7-d7fh"
                        },
                        {
                            "vulnerability": "VCID-7xdg-sn88-bkbs"
                        },
                        {
                            "vulnerability": "VCID-84q8-2457-qkc5"
                        },
                        {
                            "vulnerability": "VCID-94k8-98me-x3dw"
                        },
                        {
                            "vulnerability": "VCID-apqw-e2px-yka5"
                        },
                        {
                            "vulnerability": "VCID-b4ty-d775-5fed"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-bpht-9daq-rfgd"
                        },
                        {
                            "vulnerability": "VCID-fskg-j9fe-6yeg"
                        },
                        {
                            "vulnerability": "VCID-hfsk-4cbd-m3b1"
                        },
                        {
                            "vulnerability": "VCID-kkwp-2x9m-9bgd"
                        },
                        {
                            "vulnerability": "VCID-q2d9-vahb-6qce"
                        },
                        {
                            "vulnerability": "VCID-r7va-6j6s-rba5"
                        },
                        {
                            "vulnerability": "VCID-w4c6-p858-rkaw"
                        },
                        {
                            "vulnerability": "VCID-wxva-f9ay-c3a2"
                        },
                        {
                            "vulnerability": "VCID-xmn1-g72k-8qcq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"
                }
            ],
            "aliases": [
                "CVE-2019-14870"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "4.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-frnd-3wwy-93ek"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48474?format=api",
            "vulnerability_id": "VCID-gs98-hcdd-2yf9",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25717.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25717.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25717",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00517",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66756",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00517",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66723",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00517",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66737",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00517",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66722",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00517",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66746",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00517",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66758",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00517",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66649",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00517",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66698",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00517",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66713",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00517",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66732",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00517",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6672",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00517",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6669",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66712",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66738",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66673",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25717"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019672",
                    "reference_id": "2019672",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019672"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2538",
                    "reference_id": "AVG-2538",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2538"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4843",
                    "reference_id": "RHSA-2021:4843",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4843"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4844",
                    "reference_id": "RHSA-2021:4844",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4844"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5082",
                    "reference_id": "RHSA-2021:5082",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5082"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5192",
                    "reference_id": "RHSA-2021:5192",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5192"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0008",
                    "reference_id": "RHSA-2022:0008",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0008"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0074",
                    "reference_id": "RHSA-2022:0074",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0074"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0133",
                    "reference_id": "RHSA-2022:0133",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0133"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0443",
                    "reference_id": "RHSA-2022:0443",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0443"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5142-1/",
                    "reference_id": "USN-5142-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5142-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5174-1/",
                    "reference_id": "USN-5174-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5174-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1038160?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.9.5%2Bdfsg-5%2Bdeb10u3",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2dm7-xt4e-wkex"
                        },
                        {
                            "vulnerability": "VCID-2gkd-vubu-j7fd"
                        },
                        {
                            "vulnerability": "VCID-47k4-8k1s-zff2"
                        },
                        {
                            "vulnerability": "VCID-4qm6-a9un-nyda"
                        },
                        {
                            "vulnerability": "VCID-55zj-6b4s-8ker"
                        },
                        {
                            "vulnerability": "VCID-5vyg-1jzr-ebh8"
                        },
                        {
                            "vulnerability": "VCID-745n-wca7-d7fh"
                        },
                        {
                            "vulnerability": "VCID-76sz-d2yt-buek"
                        },
                        {
                            "vulnerability": "VCID-7bb1-3ny6-rbbv"
                        },
                        {
                            "vulnerability": "VCID-88mw-c7mc-jugp"
                        },
                        {
                            "vulnerability": "VCID-9cyh-d77a-vyhj"
                        },
                        {
                            "vulnerability": "VCID-9t1m-6chr-e3dt"
                        },
                        {
                            "vulnerability": "VCID-cgez-urtv-qbhq"
                        },
                        {
                            "vulnerability": "VCID-crh2-zv3e-pfaa"
                        },
                        {
                            "vulnerability": "VCID-ez9s-vn2t-w7a6"
                        },
                        {
                            "vulnerability": "VCID-ezk6-jy86-y3h4"
                        },
                        {
                            "vulnerability": "VCID-f772-3dtd-wba8"
                        },
                        {
                            "vulnerability": "VCID-f9hv-k2xk-puhq"
                        },
                        {
                            "vulnerability": "VCID-fh3j-efv1-tybp"
                        },
                        {
                            "vulnerability": "VCID-frnd-3wwy-93ek"
                        },
                        {
                            "vulnerability": "VCID-gs98-hcdd-2yf9"
                        },
                        {
                            "vulnerability": "VCID-hnhm-ud2a-nugz"
                        },
                        {
                            "vulnerability": "VCID-hzy4-16j5-8qcf"
                        },
                        {
                            "vulnerability": "VCID-m44e-rw2w-vuhj"
                        },
                        {
                            "vulnerability": "VCID-mgaq-qjdw-fke4"
                        },
                        {
                            "vulnerability": "VCID-mw6j-fkm4-pkg2"
                        },
                        {
                            "vulnerability": "VCID-p1se-92ae-t3b5"
                        },
                        {
                            "vulnerability": "VCID-qt4e-73xg-bqde"
                        },
                        {
                            "vulnerability": "VCID-rgu3-rgej-aucp"
                        },
                        {
                            "vulnerability": "VCID-rnfg-1cgy-jbaq"
                        },
                        {
                            "vulnerability": "VCID-rphh-hzna-nbgf"
                        },
                        {
                            "vulnerability": "VCID-s2ne-rcp3-nbgz"
                        },
                        {
                            "vulnerability": "VCID-s6ma-9h2y-hyc4"
                        },
                        {
                            "vulnerability": "VCID-smxs-4de1-nfec"
                        },
                        {
                            "vulnerability": "VCID-t3zy-v34p-7uen"
                        },
                        {
                            "vulnerability": "VCID-tk1x-bex4-8kbz"
                        },
                        {
                            "vulnerability": "VCID-vg7n-k8px-ayd5"
                        },
                        {
                            "vulnerability": "VCID-vnc5-neuk-m3ar"
                        },
                        {
                            "vulnerability": "VCID-vu43-fq85-a7eq"
                        },
                        {
                            "vulnerability": "VCID-wfhc-ehpe-abaq"
                        },
                        {
                            "vulnerability": "VCID-ws2g-8ye2-pkdk"
                        },
                        {
                            "vulnerability": "VCID-xwke-mduk-kyga"
                        },
                        {
                            "vulnerability": "VCID-xyfs-p969-syfp"
                        },
                        {
                            "vulnerability": "VCID-ycau-9h17-quf3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-5%252Bdeb10u3"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18xs-py1v-xfey"
                        },
                        {
                            "vulnerability": "VCID-28rq-1d68-4bfz"
                        },
                        {
                            "vulnerability": "VCID-2w26-yjmn-k7an"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5cd3-497h-qkhw"
                        },
                        {
                            "vulnerability": "VCID-68zz-z589-87f6"
                        },
                        {
                            "vulnerability": "VCID-6mju-nwzy-pqeq"
                        },
                        {
                            "vulnerability": "VCID-745n-wca7-d7fh"
                        },
                        {
                            "vulnerability": "VCID-7xdg-sn88-bkbs"
                        },
                        {
                            "vulnerability": "VCID-84q8-2457-qkc5"
                        },
                        {
                            "vulnerability": "VCID-94k8-98me-x3dw"
                        },
                        {
                            "vulnerability": "VCID-apqw-e2px-yka5"
                        },
                        {
                            "vulnerability": "VCID-b4ty-d775-5fed"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-bpht-9daq-rfgd"
                        },
                        {
                            "vulnerability": "VCID-fskg-j9fe-6yeg"
                        },
                        {
                            "vulnerability": "VCID-hfsk-4cbd-m3b1"
                        },
                        {
                            "vulnerability": "VCID-kkwp-2x9m-9bgd"
                        },
                        {
                            "vulnerability": "VCID-q2d9-vahb-6qce"
                        },
                        {
                            "vulnerability": "VCID-r7va-6j6s-rba5"
                        },
                        {
                            "vulnerability": "VCID-w4c6-p858-rkaw"
                        },
                        {
                            "vulnerability": "VCID-wxva-f9ay-c3a2"
                        },
                        {
                            "vulnerability": "VCID-xmn1-g72k-8qcq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"
                }
            ],
            "aliases": [
                "CVE-2020-25717"
            ],
            "risk_score": 3.6,
            "exploitability": "0.5",
            "weighted_severity": "7.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gs98-hcdd-2yf9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48478?format=api",
            "vulnerability_id": "VCID-hnhm-ud2a-nugz",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25722.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25722.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61424",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61439",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61443",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61427",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61415",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61429",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61351",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61398",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61414",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61435",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6142",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61401",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00412",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61415",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00412",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61443",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00412",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61338",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25722"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019764",
                    "reference_id": "2019764",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019764"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2538",
                    "reference_id": "AVG-2538",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2538"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5142-1/",
                    "reference_id": "USN-5142-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5142-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5174-1/",
                    "reference_id": "USN-5174-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5174-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18xs-py1v-xfey"
                        },
                        {
                            "vulnerability": "VCID-28rq-1d68-4bfz"
                        },
                        {
                            "vulnerability": "VCID-2w26-yjmn-k7an"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5cd3-497h-qkhw"
                        },
                        {
                            "vulnerability": "VCID-68zz-z589-87f6"
                        },
                        {
                            "vulnerability": "VCID-6mju-nwzy-pqeq"
                        },
                        {
                            "vulnerability": "VCID-745n-wca7-d7fh"
                        },
                        {
                            "vulnerability": "VCID-7xdg-sn88-bkbs"
                        },
                        {
                            "vulnerability": "VCID-84q8-2457-qkc5"
                        },
                        {
                            "vulnerability": "VCID-94k8-98me-x3dw"
                        },
                        {
                            "vulnerability": "VCID-apqw-e2px-yka5"
                        },
                        {
                            "vulnerability": "VCID-b4ty-d775-5fed"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-bpht-9daq-rfgd"
                        },
                        {
                            "vulnerability": "VCID-fskg-j9fe-6yeg"
                        },
                        {
                            "vulnerability": "VCID-hfsk-4cbd-m3b1"
                        },
                        {
                            "vulnerability": "VCID-kkwp-2x9m-9bgd"
                        },
                        {
                            "vulnerability": "VCID-q2d9-vahb-6qce"
                        },
                        {
                            "vulnerability": "VCID-r7va-6j6s-rba5"
                        },
                        {
                            "vulnerability": "VCID-w4c6-p858-rkaw"
                        },
                        {
                            "vulnerability": "VCID-wxva-f9ay-c3a2"
                        },
                        {
                            "vulnerability": "VCID-xmn1-g72k-8qcq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"
                }
            ],
            "aliases": [
                "CVE-2020-25722"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hnhm-ud2a-nugz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48489?format=api",
            "vulnerability_id": "VCID-hzy4-16j5-8qcf",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2031.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2031.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2031",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55424",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55385",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55363",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55414",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55403",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55384",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5542",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57525",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57544",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57524",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00422",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62033",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2031"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449",
                    "reference_id": "1016449",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094789",
                    "reference_id": "2094789",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094789"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2782",
                    "reference_id": "AVG-2782",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2782"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5542-1/",
                    "reference_id": "USN-5542-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5542-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18xs-py1v-xfey"
                        },
                        {
                            "vulnerability": "VCID-28rq-1d68-4bfz"
                        },
                        {
                            "vulnerability": "VCID-2w26-yjmn-k7an"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5cd3-497h-qkhw"
                        },
                        {
                            "vulnerability": "VCID-68zz-z589-87f6"
                        },
                        {
                            "vulnerability": "VCID-6mju-nwzy-pqeq"
                        },
                        {
                            "vulnerability": "VCID-745n-wca7-d7fh"
                        },
                        {
                            "vulnerability": "VCID-7xdg-sn88-bkbs"
                        },
                        {
                            "vulnerability": "VCID-84q8-2457-qkc5"
                        },
                        {
                            "vulnerability": "VCID-94k8-98me-x3dw"
                        },
                        {
                            "vulnerability": "VCID-apqw-e2px-yka5"
                        },
                        {
                            "vulnerability": "VCID-b4ty-d775-5fed"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-bpht-9daq-rfgd"
                        },
                        {
                            "vulnerability": "VCID-fskg-j9fe-6yeg"
                        },
                        {
                            "vulnerability": "VCID-hfsk-4cbd-m3b1"
                        },
                        {
                            "vulnerability": "VCID-kkwp-2x9m-9bgd"
                        },
                        {
                            "vulnerability": "VCID-q2d9-vahb-6qce"
                        },
                        {
                            "vulnerability": "VCID-r7va-6j6s-rba5"
                        },
                        {
                            "vulnerability": "VCID-w4c6-p858-rkaw"
                        },
                        {
                            "vulnerability": "VCID-wxva-f9ay-c3a2"
                        },
                        {
                            "vulnerability": "VCID-xmn1-g72k-8qcq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"
                }
            ],
            "aliases": [
                "CVE-2022-2031"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hzy4-16j5-8qcf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48486?format=api",
            "vulnerability_id": "VCID-m44e-rw2w-vuhj",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0336.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0336.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0336",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59459",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59573",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59567",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59587",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59531",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59556",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59525",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59576",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59589",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59607",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59591",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59571",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59604",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59611",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59595",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0336"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0336",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0336"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004694",
                    "reference_id": "1004694",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004694"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046134",
                    "reference_id": "2046134",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046134"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2648",
                    "reference_id": "AVG-2648",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2648"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5260-1/",
                    "reference_id": "USN-5260-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5260-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18xs-py1v-xfey"
                        },
                        {
                            "vulnerability": "VCID-28rq-1d68-4bfz"
                        },
                        {
                            "vulnerability": "VCID-2w26-yjmn-k7an"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5cd3-497h-qkhw"
                        },
                        {
                            "vulnerability": "VCID-68zz-z589-87f6"
                        },
                        {
                            "vulnerability": "VCID-6mju-nwzy-pqeq"
                        },
                        {
                            "vulnerability": "VCID-745n-wca7-d7fh"
                        },
                        {
                            "vulnerability": "VCID-7xdg-sn88-bkbs"
                        },
                        {
                            "vulnerability": "VCID-84q8-2457-qkc5"
                        },
                        {
                            "vulnerability": "VCID-94k8-98me-x3dw"
                        },
                        {
                            "vulnerability": "VCID-apqw-e2px-yka5"
                        },
                        {
                            "vulnerability": "VCID-b4ty-d775-5fed"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-bpht-9daq-rfgd"
                        },
                        {
                            "vulnerability": "VCID-fskg-j9fe-6yeg"
                        },
                        {
                            "vulnerability": "VCID-hfsk-4cbd-m3b1"
                        },
                        {
                            "vulnerability": "VCID-kkwp-2x9m-9bgd"
                        },
                        {
                            "vulnerability": "VCID-q2d9-vahb-6qce"
                        },
                        {
                            "vulnerability": "VCID-r7va-6j6s-rba5"
                        },
                        {
                            "vulnerability": "VCID-w4c6-p858-rkaw"
                        },
                        {
                            "vulnerability": "VCID-wxva-f9ay-c3a2"
                        },
                        {
                            "vulnerability": "VCID-xmn1-g72k-8qcq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"
                }
            ],
            "aliases": [
                "CVE-2022-0336"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m44e-rw2w-vuhj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81894?format=api",
            "vulnerability_id": "VCID-mgaq-qjdw-fke4",
            "summary": "samba: AD DC check password script does not receive full password when non-ASCII characters are used",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14833.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14833.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14833",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79414",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79549",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79463",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79494",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79496",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79527",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79533",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79421",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79444",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7943",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79459",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79469",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79491",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79473",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14833"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14833",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14833"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14833",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14833"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKPYHDFI7HRELVXBE5J4MTGSI35AKFBI/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKPYHDFI7HRELVXBE5J4MTGSI35AKFBI/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UMIYCYXCPRTVCVZ3TP6ZGPJ6RZS3IX4G/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UMIYCYXCPRTVCVZ3TP6ZGPJ6RZS3IX4G/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3IUACPZJXSC4OM6P2V4IC4QMZQZWPD/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3IUACPZJXSC4OM6P2V4IC4QMZQZWPD/"
                },
                {
                    "reference_url": "https://www.samba.org/samba/security/CVE-2019-14833.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.samba.org/samba/security/CVE-2019-14833.html"
                },
                {
                    "reference_url": "https://www.synology.com/security/advisory/Synology_SA_19_35",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.synology.com/security/advisory/Synology_SA_19_35"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764126",
                    "reference_id": "1764126",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764126"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201911-6",
                    "reference_id": "ASA-201911-6",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201911-6"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1057",
                    "reference_id": "AVG-1057",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1057"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14833",
                    "reference_id": "CVE-2019-14833",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:S/C:P/I:P/A:N"
                        },
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14833"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4167-1/",
                    "reference_id": "USN-4167-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4167-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18xs-py1v-xfey"
                        },
                        {
                            "vulnerability": "VCID-28rq-1d68-4bfz"
                        },
                        {
                            "vulnerability": "VCID-2w26-yjmn-k7an"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5cd3-497h-qkhw"
                        },
                        {
                            "vulnerability": "VCID-68zz-z589-87f6"
                        },
                        {
                            "vulnerability": "VCID-6mju-nwzy-pqeq"
                        },
                        {
                            "vulnerability": "VCID-745n-wca7-d7fh"
                        },
                        {
                            "vulnerability": "VCID-7xdg-sn88-bkbs"
                        },
                        {
                            "vulnerability": "VCID-84q8-2457-qkc5"
                        },
                        {
                            "vulnerability": "VCID-94k8-98me-x3dw"
                        },
                        {
                            "vulnerability": "VCID-apqw-e2px-yka5"
                        },
                        {
                            "vulnerability": "VCID-b4ty-d775-5fed"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-bpht-9daq-rfgd"
                        },
                        {
                            "vulnerability": "VCID-fskg-j9fe-6yeg"
                        },
                        {
                            "vulnerability": "VCID-hfsk-4cbd-m3b1"
                        },
                        {
                            "vulnerability": "VCID-kkwp-2x9m-9bgd"
                        },
                        {
                            "vulnerability": "VCID-q2d9-vahb-6qce"
                        },
                        {
                            "vulnerability": "VCID-r7va-6j6s-rba5"
                        },
                        {
                            "vulnerability": "VCID-w4c6-p858-rkaw"
                        },
                        {
                            "vulnerability": "VCID-wxva-f9ay-c3a2"
                        },
                        {
                            "vulnerability": "VCID-xmn1-g72k-8qcq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"
                }
            ],
            "aliases": [
                "CVE-2019-14833"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mgaq-qjdw-fke4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48477?format=api",
            "vulnerability_id": "VCID-mw6j-fkm4-pkg2",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25721.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25721.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25721",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00367",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58562",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00367",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58652",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00367",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58707",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00367",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58653",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00367",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58646",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00367",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58667",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00367",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58633",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00367",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58685",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00367",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58691",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00367",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58709",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00367",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5869",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00367",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5867",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00367",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58703",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25721"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2021728",
                    "reference_id": "2021728",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2021728"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2538",
                    "reference_id": "AVG-2538",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2538"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5142-1/",
                    "reference_id": "USN-5142-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5142-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18xs-py1v-xfey"
                        },
                        {
                            "vulnerability": "VCID-28rq-1d68-4bfz"
                        },
                        {
                            "vulnerability": "VCID-2w26-yjmn-k7an"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5cd3-497h-qkhw"
                        },
                        {
                            "vulnerability": "VCID-68zz-z589-87f6"
                        },
                        {
                            "vulnerability": "VCID-6mju-nwzy-pqeq"
                        },
                        {
                            "vulnerability": "VCID-745n-wca7-d7fh"
                        },
                        {
                            "vulnerability": "VCID-7xdg-sn88-bkbs"
                        },
                        {
                            "vulnerability": "VCID-84q8-2457-qkc5"
                        },
                        {
                            "vulnerability": "VCID-94k8-98me-x3dw"
                        },
                        {
                            "vulnerability": "VCID-apqw-e2px-yka5"
                        },
                        {
                            "vulnerability": "VCID-b4ty-d775-5fed"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-bpht-9daq-rfgd"
                        },
                        {
                            "vulnerability": "VCID-fskg-j9fe-6yeg"
                        },
                        {
                            "vulnerability": "VCID-hfsk-4cbd-m3b1"
                        },
                        {
                            "vulnerability": "VCID-kkwp-2x9m-9bgd"
                        },
                        {
                            "vulnerability": "VCID-q2d9-vahb-6qce"
                        },
                        {
                            "vulnerability": "VCID-r7va-6j6s-rba5"
                        },
                        {
                            "vulnerability": "VCID-w4c6-p858-rkaw"
                        },
                        {
                            "vulnerability": "VCID-wxva-f9ay-c3a2"
                        },
                        {
                            "vulnerability": "VCID-xmn1-g72k-8qcq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"
                }
            ],
            "aliases": [
                "CVE-2020-25721"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mw6j-fkm4-pkg2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46962?format=api",
            "vulnerability_id": "VCID-p1se-92ae-t3b5",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which can lead to remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2127.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2127.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2127",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78563",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78507",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7854",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78547",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01247",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79329",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01247",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79265",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01247",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79288",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01247",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79274",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01247",
                            "scoring_system": "epss",
                            "scoring_elements": "0.793",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01247",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79309",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01247",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79333",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01247",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79317",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01247",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79306",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2127"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222791",
                    "reference_id": "2222791",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T15:21:45Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222791"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:8::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:8::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::resilientstorage",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::resilientstorage",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::resilientstorage"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream",
                    "reference_id": "cpe:/a:redhat:rhel_eus:8.6::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb",
                    "reference_id": "cpe:/a:redhat:rhel_eus:8.6::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream",
                    "reference_id": "cpe:/a:redhat:rhel_eus:8.8::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb",
                    "reference_id": "cpe:/a:redhat:rhel_eus:8.8::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:storage:3",
                    "reference_id": "cpe:/a:redhat:storage:3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:storage:3"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:6",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:8::baseos",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:9::baseos",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos",
                    "reference_id": "cpe:/o:redhat:rhel_eus:8.6::baseos",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos",
                    "reference_id": "cpe:/o:redhat:rhel_eus:8.8::baseos",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8",
                    "reference_id": "cpe:/o:redhat:rhev_hypervisor:4.4::el8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2022-2127",
                    "reference_id": "CVE-2022-2127",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T15:21:45Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2022-2127"
                },
                {
                    "reference_url": "https://www.samba.org/samba/security/CVE-2022-2127.html",
                    "reference_id": "CVE-2022-2127.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T15:21:45Z/"
                        }
                    ],
                    "url": "https://www.samba.org/samba/security/CVE-2022-2127.html"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-28",
                    "reference_id": "GLSA-202402-28",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-28"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6667",
                    "reference_id": "RHSA-2023:6667",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T15:21:45Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6667"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7139",
                    "reference_id": "RHSA-2023:7139",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T15:21:45Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7139"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0423",
                    "reference_id": "RHSA-2024:0423",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T15:21:45Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0423"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0580",
                    "reference_id": "RHSA-2024:0580",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T15:21:45Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0580"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6238-1/",
                    "reference_id": "USN-6238-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6238-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18xs-py1v-xfey"
                        },
                        {
                            "vulnerability": "VCID-28rq-1d68-4bfz"
                        },
                        {
                            "vulnerability": "VCID-2w26-yjmn-k7an"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5cd3-497h-qkhw"
                        },
                        {
                            "vulnerability": "VCID-68zz-z589-87f6"
                        },
                        {
                            "vulnerability": "VCID-6mju-nwzy-pqeq"
                        },
                        {
                            "vulnerability": "VCID-745n-wca7-d7fh"
                        },
                        {
                            "vulnerability": "VCID-7xdg-sn88-bkbs"
                        },
                        {
                            "vulnerability": "VCID-84q8-2457-qkc5"
                        },
                        {
                            "vulnerability": "VCID-94k8-98me-x3dw"
                        },
                        {
                            "vulnerability": "VCID-apqw-e2px-yka5"
                        },
                        {
                            "vulnerability": "VCID-b4ty-d775-5fed"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-bpht-9daq-rfgd"
                        },
                        {
                            "vulnerability": "VCID-fskg-j9fe-6yeg"
                        },
                        {
                            "vulnerability": "VCID-hfsk-4cbd-m3b1"
                        },
                        {
                            "vulnerability": "VCID-kkwp-2x9m-9bgd"
                        },
                        {
                            "vulnerability": "VCID-q2d9-vahb-6qce"
                        },
                        {
                            "vulnerability": "VCID-r7va-6j6s-rba5"
                        },
                        {
                            "vulnerability": "VCID-w4c6-p858-rkaw"
                        },
                        {
                            "vulnerability": "VCID-wxva-f9ay-c3a2"
                        },
                        {
                            "vulnerability": "VCID-xmn1-g72k-8qcq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"
                }
            ],
            "aliases": [
                "CVE-2022-2127"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p1se-92ae-t3b5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47169?format=api",
            "vulnerability_id": "VCID-qt4e-73xg-bqde",
            "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14318.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14318.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14318",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00157",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36453",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00157",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36629",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00157",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36143",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00157",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36569",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00157",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36576",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00157",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36541",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00157",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36517",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00157",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36561",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00157",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36543",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00157",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36488",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00157",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3626",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00157",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3623",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00157",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36661",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00157",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36498",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00157",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3655",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14318"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14318",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14318"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892631",
                    "reference_id": "1892631",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T14:56:23Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892631"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973400",
                    "reference_id": "973400",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973400"
                },
                {
                    "reference_url": "https://www.samba.org/samba/security/CVE-2020-14318.html",
                    "reference_id": "CVE-2020-14318.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T14:56:23Z/"
                        }
                    ],
                    "url": "https://www.samba.org/samba/security/CVE-2020-14318.html"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202012-24",
                    "reference_id": "GLSA-202012-24",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T14:56:23Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202012-24"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html",
                    "reference_id": "msg00015.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T14:56:23Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5439",
                    "reference_id": "RHSA-2020:5439",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5439"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1647",
                    "reference_id": "RHSA-2021:1647",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1647"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3723",
                    "reference_id": "RHSA-2021:3723",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3723"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4611-1/",
                    "reference_id": "USN-4611-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4611-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4931-1/",
                    "reference_id": "USN-4931-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4931-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18xs-py1v-xfey"
                        },
                        {
                            "vulnerability": "VCID-28rq-1d68-4bfz"
                        },
                        {
                            "vulnerability": "VCID-2w26-yjmn-k7an"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5cd3-497h-qkhw"
                        },
                        {
                            "vulnerability": "VCID-68zz-z589-87f6"
                        },
                        {
                            "vulnerability": "VCID-6mju-nwzy-pqeq"
                        },
                        {
                            "vulnerability": "VCID-745n-wca7-d7fh"
                        },
                        {
                            "vulnerability": "VCID-7xdg-sn88-bkbs"
                        },
                        {
                            "vulnerability": "VCID-84q8-2457-qkc5"
                        },
                        {
                            "vulnerability": "VCID-94k8-98me-x3dw"
                        },
                        {
                            "vulnerability": "VCID-apqw-e2px-yka5"
                        },
                        {
                            "vulnerability": "VCID-b4ty-d775-5fed"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-bpht-9daq-rfgd"
                        },
                        {
                            "vulnerability": "VCID-fskg-j9fe-6yeg"
                        },
                        {
                            "vulnerability": "VCID-hfsk-4cbd-m3b1"
                        },
                        {
                            "vulnerability": "VCID-kkwp-2x9m-9bgd"
                        },
                        {
                            "vulnerability": "VCID-q2d9-vahb-6qce"
                        },
                        {
                            "vulnerability": "VCID-r7va-6j6s-rba5"
                        },
                        {
                            "vulnerability": "VCID-w4c6-p858-rkaw"
                        },
                        {
                            "vulnerability": "VCID-wxva-f9ay-c3a2"
                        },
                        {
                            "vulnerability": "VCID-xmn1-g72k-8qcq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"
                }
            ],
            "aliases": [
                "CVE-2020-14318"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qt4e-73xg-bqde"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48497?format=api",
            "vulnerability_id": "VCID-rgu3-rgej-aucp",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32745.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32745.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00425",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62238",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00425",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62228",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00425",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62207",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00425",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62253",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00425",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6226",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00425",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62244",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00425",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62185",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00425",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62153",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00425",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62203",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00425",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62221",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00461",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64207",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00461",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64221",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00555",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68055",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32745"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449",
                    "reference_id": "1016449",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108211",
                    "reference_id": "2108211",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108211"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2782",
                    "reference_id": "AVG-2782",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2782"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5542-1/",
                    "reference_id": "USN-5542-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5542-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18xs-py1v-xfey"
                        },
                        {
                            "vulnerability": "VCID-28rq-1d68-4bfz"
                        },
                        {
                            "vulnerability": "VCID-2w26-yjmn-k7an"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5cd3-497h-qkhw"
                        },
                        {
                            "vulnerability": "VCID-68zz-z589-87f6"
                        },
                        {
                            "vulnerability": "VCID-6mju-nwzy-pqeq"
                        },
                        {
                            "vulnerability": "VCID-745n-wca7-d7fh"
                        },
                        {
                            "vulnerability": "VCID-7xdg-sn88-bkbs"
                        },
                        {
                            "vulnerability": "VCID-84q8-2457-qkc5"
                        },
                        {
                            "vulnerability": "VCID-94k8-98me-x3dw"
                        },
                        {
                            "vulnerability": "VCID-apqw-e2px-yka5"
                        },
                        {
                            "vulnerability": "VCID-b4ty-d775-5fed"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-bpht-9daq-rfgd"
                        },
                        {
                            "vulnerability": "VCID-fskg-j9fe-6yeg"
                        },
                        {
                            "vulnerability": "VCID-hfsk-4cbd-m3b1"
                        },
                        {
                            "vulnerability": "VCID-kkwp-2x9m-9bgd"
                        },
                        {
                            "vulnerability": "VCID-q2d9-vahb-6qce"
                        },
                        {
                            "vulnerability": "VCID-r7va-6j6s-rba5"
                        },
                        {
                            "vulnerability": "VCID-w4c6-p858-rkaw"
                        },
                        {
                            "vulnerability": "VCID-wxva-f9ay-c3a2"
                        },
                        {
                            "vulnerability": "VCID-xmn1-g72k-8qcq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"
                }
            ],
            "aliases": [
                "CVE-2022-32745"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rgu3-rgej-aucp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46967?format=api",
            "vulnerability_id": "VCID-rnfg-1cgy-jbaq",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which can lead to remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34966.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34966.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34966",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.13565",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94255",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.13565",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94252",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.13565",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94256",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.15899",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94729",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.15899",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9474",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.15899",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94744",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.15899",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94748",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.15899",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94752",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.15899",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94761",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.15899",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94764",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.15899",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9473",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.15899",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94725",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34966"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222793",
                    "reference_id": "2222793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222793"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-28",
                    "reference_id": "GLSA-202402-28",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-28"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6667",
                    "reference_id": "RHSA-2023:6667",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6667"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7139",
                    "reference_id": "RHSA-2023:7139",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7139"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0423",
                    "reference_id": "RHSA-2024:0423",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0423"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0580",
                    "reference_id": "RHSA-2024:0580",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0580"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4101",
                    "reference_id": "RHSA-2024:4101",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4101"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6238-1/",
                    "reference_id": "USN-6238-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6238-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7582-1/",
                    "reference_id": "USN-7582-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7582-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18xs-py1v-xfey"
                        },
                        {
                            "vulnerability": "VCID-28rq-1d68-4bfz"
                        },
                        {
                            "vulnerability": "VCID-2w26-yjmn-k7an"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5cd3-497h-qkhw"
                        },
                        {
                            "vulnerability": "VCID-68zz-z589-87f6"
                        },
                        {
                            "vulnerability": "VCID-6mju-nwzy-pqeq"
                        },
                        {
                            "vulnerability": "VCID-745n-wca7-d7fh"
                        },
                        {
                            "vulnerability": "VCID-7xdg-sn88-bkbs"
                        },
                        {
                            "vulnerability": "VCID-84q8-2457-qkc5"
                        },
                        {
                            "vulnerability": "VCID-94k8-98me-x3dw"
                        },
                        {
                            "vulnerability": "VCID-apqw-e2px-yka5"
                        },
                        {
                            "vulnerability": "VCID-b4ty-d775-5fed"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-bpht-9daq-rfgd"
                        },
                        {
                            "vulnerability": "VCID-fskg-j9fe-6yeg"
                        },
                        {
                            "vulnerability": "VCID-hfsk-4cbd-m3b1"
                        },
                        {
                            "vulnerability": "VCID-kkwp-2x9m-9bgd"
                        },
                        {
                            "vulnerability": "VCID-q2d9-vahb-6qce"
                        },
                        {
                            "vulnerability": "VCID-r7va-6j6s-rba5"
                        },
                        {
                            "vulnerability": "VCID-w4c6-p858-rkaw"
                        },
                        {
                            "vulnerability": "VCID-wxva-f9ay-c3a2"
                        },
                        {
                            "vulnerability": "VCID-xmn1-g72k-8qcq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"
                }
            ],
            "aliases": [
                "CVE-2023-34966"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rnfg-1cgy-jbaq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/44835?format=api",
            "vulnerability_id": "VCID-rphh-hzna-nbgf",
            "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10760.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10760.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-10760",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84829",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84958",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.02353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84951",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84959",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84845",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84863",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84864",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84887",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84894",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84913",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84911",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84905",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84927",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84928",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84926",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-10760"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10760",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10760"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1849509",
                    "reference_id": "1849509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1849509"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1202",
                    "reference_id": "AVG-1202",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1202"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202007-15",
                    "reference_id": "GLSA-202007-15",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202007-15"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4409-1/",
                    "reference_id": "USN-4409-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4409-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18xs-py1v-xfey"
                        },
                        {
                            "vulnerability": "VCID-28rq-1d68-4bfz"
                        },
                        {
                            "vulnerability": "VCID-2w26-yjmn-k7an"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5cd3-497h-qkhw"
                        },
                        {
                            "vulnerability": "VCID-68zz-z589-87f6"
                        },
                        {
                            "vulnerability": "VCID-6mju-nwzy-pqeq"
                        },
                        {
                            "vulnerability": "VCID-745n-wca7-d7fh"
                        },
                        {
                            "vulnerability": "VCID-7xdg-sn88-bkbs"
                        },
                        {
                            "vulnerability": "VCID-84q8-2457-qkc5"
                        },
                        {
                            "vulnerability": "VCID-94k8-98me-x3dw"
                        },
                        {
                            "vulnerability": "VCID-apqw-e2px-yka5"
                        },
                        {
                            "vulnerability": "VCID-b4ty-d775-5fed"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-bpht-9daq-rfgd"
                        },
                        {
                            "vulnerability": "VCID-fskg-j9fe-6yeg"
                        },
                        {
                            "vulnerability": "VCID-hfsk-4cbd-m3b1"
                        },
                        {
                            "vulnerability": "VCID-kkwp-2x9m-9bgd"
                        },
                        {
                            "vulnerability": "VCID-q2d9-vahb-6qce"
                        },
                        {
                            "vulnerability": "VCID-r7va-6j6s-rba5"
                        },
                        {
                            "vulnerability": "VCID-w4c6-p858-rkaw"
                        },
                        {
                            "vulnerability": "VCID-wxva-f9ay-c3a2"
                        },
                        {
                            "vulnerability": "VCID-xmn1-g72k-8qcq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"
                }
            ],
            "aliases": [
                "CVE-2020-10760"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rphh-hzna-nbgf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48490?format=api",
            "vulnerability_id": "VCID-s2ne-rcp3-nbgz",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3437.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3437.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3437",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72659",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72529",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72545",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72522",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7256",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72572",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72596",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72579",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72568",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7261",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72621",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72612",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72654",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72663",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3437"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/02/08/1",
                    "reference_id": "1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2023/02/08/1"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187",
                    "reference_id": "1024187",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137774",
                    "reference_id": "2137774",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137774"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2828",
                    "reference_id": "AVG-2828",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Unknown",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2828"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2022-3437",
                    "reference_id": "CVE-2022-3437",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2022-3437"
                },
                {
                    "reference_url": "https://www.samba.org/samba/security/CVE-2022-3437.html",
                    "reference_id": "CVE-2022-3437.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/"
                        }
                    ],
                    "url": "https://www.samba.org/samba/security/CVE-2022-3437.html"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202310-06",
                    "reference_id": "GLSA-202310-06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202310-06"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html",
                    "reference_id": "msg00015.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230216-0008/",
                    "reference_id": "ntap-20230216-0008",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230216-0008/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5800-1/",
                    "reference_id": "USN-5800-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5800-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5822-1/",
                    "reference_id": "USN-5822-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5822-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5936-1/",
                    "reference_id": "USN-5936-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5936-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7582-1/",
                    "reference_id": "USN-7582-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7582-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18xs-py1v-xfey"
                        },
                        {
                            "vulnerability": "VCID-28rq-1d68-4bfz"
                        },
                        {
                            "vulnerability": "VCID-2w26-yjmn-k7an"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5cd3-497h-qkhw"
                        },
                        {
                            "vulnerability": "VCID-68zz-z589-87f6"
                        },
                        {
                            "vulnerability": "VCID-6mju-nwzy-pqeq"
                        },
                        {
                            "vulnerability": "VCID-745n-wca7-d7fh"
                        },
                        {
                            "vulnerability": "VCID-7xdg-sn88-bkbs"
                        },
                        {
                            "vulnerability": "VCID-84q8-2457-qkc5"
                        },
                        {
                            "vulnerability": "VCID-94k8-98me-x3dw"
                        },
                        {
                            "vulnerability": "VCID-apqw-e2px-yka5"
                        },
                        {
                            "vulnerability": "VCID-b4ty-d775-5fed"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-bpht-9daq-rfgd"
                        },
                        {
                            "vulnerability": "VCID-fskg-j9fe-6yeg"
                        },
                        {
                            "vulnerability": "VCID-hfsk-4cbd-m3b1"
                        },
                        {
                            "vulnerability": "VCID-kkwp-2x9m-9bgd"
                        },
                        {
                            "vulnerability": "VCID-q2d9-vahb-6qce"
                        },
                        {
                            "vulnerability": "VCID-r7va-6j6s-rba5"
                        },
                        {
                            "vulnerability": "VCID-w4c6-p858-rkaw"
                        },
                        {
                            "vulnerability": "VCID-wxva-f9ay-c3a2"
                        },
                        {
                            "vulnerability": "VCID-xmn1-g72k-8qcq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"
                }
            ],
            "aliases": [
                "CVE-2022-3437"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s2ne-rcp3-nbgz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81893?format=api",
            "vulnerability_id": "VCID-s6ma-9h2y-hyc4",
            "summary": "samba: smb client vulnerable to filenames containing path separators",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10218.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10218.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10218",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04508",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89084",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04508",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89175",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.04508",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89138",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04508",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89151",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.04508",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89148",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.04508",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89165",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.04508",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8917",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.04508",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89093",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04508",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89107",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04508",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8911",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04508",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89128",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04508",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89133",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04508",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89144",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04508",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8914",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10218"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10218",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10218"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10218",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10218"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKPYHDFI7HRELVXBE5J4MTGSI35AKFBI/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKPYHDFI7HRELVXBE5J4MTGSI35AKFBI/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UMIYCYXCPRTVCVZ3TP6ZGPJ6RZS3IX4G/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UMIYCYXCPRTVCVZ3TP6ZGPJ6RZS3IX4G/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3IUACPZJXSC4OM6P2V4IC4QMZQZWPD/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3IUACPZJXSC4OM6P2V4IC4QMZQZWPD/"
                },
                {
                    "reference_url": "https://www.samba.org/samba/security/CVE-2019-10218.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.samba.org/samba/security/CVE-2019-10218.html"
                },
                {
                    "reference_url": "https://www.synology.com/security/advisory/Synology_SA_19_35",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.synology.com/security/advisory/Synology_SA_19_35"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763137",
                    "reference_id": "1763137",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763137"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201911-6",
                    "reference_id": "ASA-201911-6",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201911-6"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1057",
                    "reference_id": "AVG-1057",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1057"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10218",
                    "reference_id": "CVE-2019-10218",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10218"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:0943",
                    "reference_id": "RHSA-2020:0943",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:0943"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1084",
                    "reference_id": "RHSA-2020:1084",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1084"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1878",
                    "reference_id": "RHSA-2020:1878",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1878"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4167-1/",
                    "reference_id": "USN-4167-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4167-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4167-2/",
                    "reference_id": "USN-4167-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4167-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18xs-py1v-xfey"
                        },
                        {
                            "vulnerability": "VCID-28rq-1d68-4bfz"
                        },
                        {
                            "vulnerability": "VCID-2w26-yjmn-k7an"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5cd3-497h-qkhw"
                        },
                        {
                            "vulnerability": "VCID-68zz-z589-87f6"
                        },
                        {
                            "vulnerability": "VCID-6mju-nwzy-pqeq"
                        },
                        {
                            "vulnerability": "VCID-745n-wca7-d7fh"
                        },
                        {
                            "vulnerability": "VCID-7xdg-sn88-bkbs"
                        },
                        {
                            "vulnerability": "VCID-84q8-2457-qkc5"
                        },
                        {
                            "vulnerability": "VCID-94k8-98me-x3dw"
                        },
                        {
                            "vulnerability": "VCID-apqw-e2px-yka5"
                        },
                        {
                            "vulnerability": "VCID-b4ty-d775-5fed"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-bpht-9daq-rfgd"
                        },
                        {
                            "vulnerability": "VCID-fskg-j9fe-6yeg"
                        },
                        {
                            "vulnerability": "VCID-hfsk-4cbd-m3b1"
                        },
                        {
                            "vulnerability": "VCID-kkwp-2x9m-9bgd"
                        },
                        {
                            "vulnerability": "VCID-q2d9-vahb-6qce"
                        },
                        {
                            "vulnerability": "VCID-r7va-6j6s-rba5"
                        },
                        {
                            "vulnerability": "VCID-w4c6-p858-rkaw"
                        },
                        {
                            "vulnerability": "VCID-wxva-f9ay-c3a2"
                        },
                        {
                            "vulnerability": "VCID-xmn1-g72k-8qcq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"
                }
            ],
            "aliases": [
                "CVE-2019-10218"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s6ma-9h2y-hyc4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46965?format=api",
            "vulnerability_id": "VCID-smxs-4de1-nfec",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which can lead to remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4091.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4091.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4091",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63181",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63147",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63169",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63183",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00476",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64884",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00476",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64921",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00476",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6485",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00476",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64931",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00476",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64877",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00476",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6484",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00476",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6489",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00476",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64905",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00476",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64922",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00476",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64912",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4091"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241882",
                    "reference_id": "2241882",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T16:18:12Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241882"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:8::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:8::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::resilientstorage",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::resilientstorage",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::resilientstorage"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream",
                    "reference_id": "cpe:/a:redhat:rhel_eus:8.6::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb",
                    "reference_id": "cpe:/a:redhat:rhel_eus:8.6::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream",
                    "reference_id": "cpe:/a:redhat:rhel_eus:8.8::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb",
                    "reference_id": "cpe:/a:redhat:rhel_eus:8.8::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream",
                    "reference_id": "cpe:/a:redhat:rhel_eus:9.0::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb",
                    "reference_id": "cpe:/a:redhat:rhel_eus:9.0::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::resilientstorage",
                    "reference_id": "cpe:/a:redhat:rhel_eus:9.0::resilientstorage",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::resilientstorage"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream",
                    "reference_id": "cpe:/a:redhat:rhel_eus:9.2::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb",
                    "reference_id": "cpe:/a:redhat:rhel_eus:9.2::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::resilientstorage",
                    "reference_id": "cpe:/a:redhat:rhel_eus:9.2::resilientstorage",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::resilientstorage"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:storage:3",
                    "reference_id": "cpe:/a:redhat:storage:3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:storage:3"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:6",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:8::baseos",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:9::baseos",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos",
                    "reference_id": "cpe:/o:redhat:rhel_eus:8.6::baseos",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos",
                    "reference_id": "cpe:/o:redhat:rhel_eus:8.8::baseos",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.0::baseos",
                    "reference_id": "cpe:/o:redhat:rhel_eus:9.0::baseos",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.0::baseos"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos",
                    "reference_id": "cpe:/o:redhat:rhel_eus:9.2::baseos",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8",
                    "reference_id": "cpe:/o:redhat:rhev_hypervisor:4.4::el8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2023-4091",
                    "reference_id": "CVE-2023-4091",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T16:18:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2023-4091"
                },
                {
                    "reference_url": "https://www.samba.org/samba/security/CVE-2023-4091.html",
                    "reference_id": "CVE-2023-4091.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T16:18:12Z/"
                        }
                    ],
                    "url": "https://www.samba.org/samba/security/CVE-2023-4091.html"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-28",
                    "reference_id": "GLSA-202402-28",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-28"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6209",
                    "reference_id": "RHSA-2023:6209",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T16:18:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6209"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6744",
                    "reference_id": "RHSA-2023:6744",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T16:18:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6744"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7371",
                    "reference_id": "RHSA-2023:7371",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T16:18:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7371"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7408",
                    "reference_id": "RHSA-2023:7408",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T16:18:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7408"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7464",
                    "reference_id": "RHSA-2023:7464",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T16:18:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7464"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7467",
                    "reference_id": "RHSA-2023:7467",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T16:18:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7467"
                },
                {
                    "reference_url": "https://bugzilla.samba.org/show_bug.cgi?id=15439",
                    "reference_id": "show_bug.cgi?id=15439",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T16:18:12Z/"
                        }
                    ],
                    "url": "https://bugzilla.samba.org/show_bug.cgi?id=15439"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6425-1/",
                    "reference_id": "USN-6425-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6425-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6425-3/",
                    "reference_id": "USN-6425-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6425-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18xs-py1v-xfey"
                        },
                        {
                            "vulnerability": "VCID-28rq-1d68-4bfz"
                        },
                        {
                            "vulnerability": "VCID-2w26-yjmn-k7an"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5cd3-497h-qkhw"
                        },
                        {
                            "vulnerability": "VCID-68zz-z589-87f6"
                        },
                        {
                            "vulnerability": "VCID-6mju-nwzy-pqeq"
                        },
                        {
                            "vulnerability": "VCID-745n-wca7-d7fh"
                        },
                        {
                            "vulnerability": "VCID-7xdg-sn88-bkbs"
                        },
                        {
                            "vulnerability": "VCID-84q8-2457-qkc5"
                        },
                        {
                            "vulnerability": "VCID-94k8-98me-x3dw"
                        },
                        {
                            "vulnerability": "VCID-apqw-e2px-yka5"
                        },
                        {
                            "vulnerability": "VCID-b4ty-d775-5fed"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-bpht-9daq-rfgd"
                        },
                        {
                            "vulnerability": "VCID-fskg-j9fe-6yeg"
                        },
                        {
                            "vulnerability": "VCID-hfsk-4cbd-m3b1"
                        },
                        {
                            "vulnerability": "VCID-kkwp-2x9m-9bgd"
                        },
                        {
                            "vulnerability": "VCID-q2d9-vahb-6qce"
                        },
                        {
                            "vulnerability": "VCID-r7va-6j6s-rba5"
                        },
                        {
                            "vulnerability": "VCID-w4c6-p858-rkaw"
                        },
                        {
                            "vulnerability": "VCID-wxva-f9ay-c3a2"
                        },
                        {
                            "vulnerability": "VCID-xmn1-g72k-8qcq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"
                }
            ],
            "aliases": [
                "CVE-2023-4091"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-smxs-4de1-nfec"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48498?format=api",
            "vulnerability_id": "VCID-t3zy-v34p-7uen",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32746.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32746.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32746",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00302",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53475",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56703",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56678",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56657",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56688",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56687",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56659",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5666",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56638",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5669",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56694",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00368",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58703",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00368",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58687",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00368",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58688",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32746"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449",
                    "reference_id": "1016449",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108215",
                    "reference_id": "2108215",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108215"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2782",
                    "reference_id": "AVG-2782",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2782"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7730",
                    "reference_id": "RHSA-2022:7730",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7730"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8318",
                    "reference_id": "RHSA-2022:8318",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8318"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5542-1/",
                    "reference_id": "USN-5542-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5542-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18xs-py1v-xfey"
                        },
                        {
                            "vulnerability": "VCID-28rq-1d68-4bfz"
                        },
                        {
                            "vulnerability": "VCID-2w26-yjmn-k7an"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5cd3-497h-qkhw"
                        },
                        {
                            "vulnerability": "VCID-68zz-z589-87f6"
                        },
                        {
                            "vulnerability": "VCID-6mju-nwzy-pqeq"
                        },
                        {
                            "vulnerability": "VCID-745n-wca7-d7fh"
                        },
                        {
                            "vulnerability": "VCID-7xdg-sn88-bkbs"
                        },
                        {
                            "vulnerability": "VCID-84q8-2457-qkc5"
                        },
                        {
                            "vulnerability": "VCID-94k8-98me-x3dw"
                        },
                        {
                            "vulnerability": "VCID-apqw-e2px-yka5"
                        },
                        {
                            "vulnerability": "VCID-b4ty-d775-5fed"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-bpht-9daq-rfgd"
                        },
                        {
                            "vulnerability": "VCID-fskg-j9fe-6yeg"
                        },
                        {
                            "vulnerability": "VCID-hfsk-4cbd-m3b1"
                        },
                        {
                            "vulnerability": "VCID-kkwp-2x9m-9bgd"
                        },
                        {
                            "vulnerability": "VCID-q2d9-vahb-6qce"
                        },
                        {
                            "vulnerability": "VCID-r7va-6j6s-rba5"
                        },
                        {
                            "vulnerability": "VCID-w4c6-p858-rkaw"
                        },
                        {
                            "vulnerability": "VCID-wxva-f9ay-c3a2"
                        },
                        {
                            "vulnerability": "VCID-xmn1-g72k-8qcq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"
                }
            ],
            "aliases": [
                "CVE-2022-32746"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t3zy-v34p-7uen"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48480?format=api",
            "vulnerability_id": "VCID-tk1x-bex4-8kbz",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3738.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3738.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3738",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60803",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60825",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60809",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60797",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60811",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00402",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60813",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00402",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60826",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00402",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60842",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00402",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60863",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00402",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6085",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00402",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60831",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00402",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60873",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00402",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60711",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00402",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60784",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00402",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60777",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3738"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2021726",
                    "reference_id": "2021726",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2021726"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2538",
                    "reference_id": "AVG-2538",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2538"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5142-1/",
                    "reference_id": "USN-5142-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5142-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18xs-py1v-xfey"
                        },
                        {
                            "vulnerability": "VCID-28rq-1d68-4bfz"
                        },
                        {
                            "vulnerability": "VCID-2w26-yjmn-k7an"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5cd3-497h-qkhw"
                        },
                        {
                            "vulnerability": "VCID-68zz-z589-87f6"
                        },
                        {
                            "vulnerability": "VCID-6mju-nwzy-pqeq"
                        },
                        {
                            "vulnerability": "VCID-745n-wca7-d7fh"
                        },
                        {
                            "vulnerability": "VCID-7xdg-sn88-bkbs"
                        },
                        {
                            "vulnerability": "VCID-84q8-2457-qkc5"
                        },
                        {
                            "vulnerability": "VCID-94k8-98me-x3dw"
                        },
                        {
                            "vulnerability": "VCID-apqw-e2px-yka5"
                        },
                        {
                            "vulnerability": "VCID-b4ty-d775-5fed"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-bpht-9daq-rfgd"
                        },
                        {
                            "vulnerability": "VCID-fskg-j9fe-6yeg"
                        },
                        {
                            "vulnerability": "VCID-hfsk-4cbd-m3b1"
                        },
                        {
                            "vulnerability": "VCID-kkwp-2x9m-9bgd"
                        },
                        {
                            "vulnerability": "VCID-q2d9-vahb-6qce"
                        },
                        {
                            "vulnerability": "VCID-r7va-6j6s-rba5"
                        },
                        {
                            "vulnerability": "VCID-w4c6-p858-rkaw"
                        },
                        {
                            "vulnerability": "VCID-wxva-f9ay-c3a2"
                        },
                        {
                            "vulnerability": "VCID-xmn1-g72k-8qcq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"
                }
            ],
            "aliases": [
                "CVE-2021-3738"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tk1x-bex4-8kbz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/44826?format=api",
            "vulnerability_id": "VCID-vg7n-k8px-ayd5",
            "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10704.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10704.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-10704",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.08887",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92525",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.08887",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92531",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.08887",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92538",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.08887",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92541",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.08887",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92552",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.08887",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92557",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.08887",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92563",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.08887",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92564",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.08887",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92574",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.08887",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92577",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.08887",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92579",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.08887",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92576",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-10704"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10704",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10704"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1825734",
                    "reference_id": "1825734",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1825734"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960188",
                    "reference_id": "960188",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960188"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202007-15",
                    "reference_id": "GLSA-202007-15",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202007-15"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4341-1/",
                    "reference_id": "USN-4341-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4341-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4341-2/",
                    "reference_id": "USN-4341-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4341-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18xs-py1v-xfey"
                        },
                        {
                            "vulnerability": "VCID-28rq-1d68-4bfz"
                        },
                        {
                            "vulnerability": "VCID-2w26-yjmn-k7an"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5cd3-497h-qkhw"
                        },
                        {
                            "vulnerability": "VCID-68zz-z589-87f6"
                        },
                        {
                            "vulnerability": "VCID-6mju-nwzy-pqeq"
                        },
                        {
                            "vulnerability": "VCID-745n-wca7-d7fh"
                        },
                        {
                            "vulnerability": "VCID-7xdg-sn88-bkbs"
                        },
                        {
                            "vulnerability": "VCID-84q8-2457-qkc5"
                        },
                        {
                            "vulnerability": "VCID-94k8-98me-x3dw"
                        },
                        {
                            "vulnerability": "VCID-apqw-e2px-yka5"
                        },
                        {
                            "vulnerability": "VCID-b4ty-d775-5fed"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-bpht-9daq-rfgd"
                        },
                        {
                            "vulnerability": "VCID-fskg-j9fe-6yeg"
                        },
                        {
                            "vulnerability": "VCID-hfsk-4cbd-m3b1"
                        },
                        {
                            "vulnerability": "VCID-kkwp-2x9m-9bgd"
                        },
                        {
                            "vulnerability": "VCID-q2d9-vahb-6qce"
                        },
                        {
                            "vulnerability": "VCID-r7va-6j6s-rba5"
                        },
                        {
                            "vulnerability": "VCID-w4c6-p858-rkaw"
                        },
                        {
                            "vulnerability": "VCID-wxva-f9ay-c3a2"
                        },
                        {
                            "vulnerability": "VCID-xmn1-g72k-8qcq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"
                }
            ],
            "aliases": [
                "CVE-2020-10704"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vg7n-k8px-ayd5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47172?format=api",
            "vulnerability_id": "VCID-vnc5-neuk-m3ar",
            "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1472.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1472.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-1472",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.9438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9997",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.9438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99969",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.9438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99968",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-1472"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1472",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1472"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879822",
                    "reference_id": "1879822",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879822"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2020/09/17/2",
                    "reference_id": "2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2020/09/17/2"
                },
                {
                    "reference_url": "https://www.kb.cert.org/vuls/id/490028",
                    "reference_id": "490028",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/"
                        }
                    ],
                    "url": "https://www.kb.cert.org/vuls/id/490028"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=971048",
                    "reference_id": "971048",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=971048"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202009-17",
                    "reference_id": "ASA-202009-17",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202009-17"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1236",
                    "reference_id": "AVG-1236",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1236"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/49071.py",
                    "reference_id": "CVE-2020-1472",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/49071.py"
                },
                {
                    "reference_url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472",
                    "reference_id": "CVE-2020-1472",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/"
                        }
                    ],
                    "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202012-24",
                    "reference_id": "GLSA-202012-24",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202012-24"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4OTFBL6YDVFH2TBJFJIE4FMHPJEEJK3/",
                    "reference_id": "H4OTFBL6YDVFH2TBJFJIE4FMHPJEEJK3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4OTFBL6YDVFH2TBJFJIE4FMHPJEEJK3/"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html",
                    "reference_id": "msg00041.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00080.html",
                    "reference_id": "msg00080.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00080.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00086.html",
                    "reference_id": "msg00086.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00086.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5439",
                    "reference_id": "RHSA-2020:5439",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5439"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1647",
                    "reference_id": "RHSA-2021:1647",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1647"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3723",
                    "reference_id": "RHSA-2021:3723",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3723"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ST6X3A2XXYMGD4INR26DQ4FP4QSM753B/",
                    "reference_id": "ST6X3A2XXYMGD4INR26DQ4FP4QSM753B",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ST6X3A2XXYMGD4INR26DQ4FP4QSM753B/"
                },
                {
                    "reference_url": "https://www.synology.com/security/advisory/Synology_SA_20_21",
                    "reference_id": "Synology_SA_20_21",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/"
                        }
                    ],
                    "url": "https://www.synology.com/security/advisory/Synology_SA_20_21"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TAPQQZZAT4TG3XVRTAFV2Y3S7OAHFBUP/",
                    "reference_id": "TAPQQZZAT4TG3XVRTAFV2Y3S7OAHFBUP",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TAPQQZZAT4TG3XVRTAFV2Y3S7OAHFBUP/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4510-1/",
                    "reference_id": "USN-4510-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4510-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4510-2/",
                    "reference_id": "USN-4510-2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4510-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4559-1/",
                    "reference_id": "USN-4559-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4559-1/"
                },
                {
                    "reference_url": "http://packetstormsecurity.com/files/160127/Zerologon-Netlogon-Privilege-Escalation.html",
                    "reference_id": "Zerologon-Netlogon-Privilege-Escalation.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/"
                        }
                    ],
                    "url": "http://packetstormsecurity.com/files/160127/Zerologon-Netlogon-Privilege-Escalation.html"
                },
                {
                    "reference_url": "http://packetstormsecurity.com/files/159190/Zerologon-Proof-Of-Concept.html",
                    "reference_id": "Zerologon-Proof-Of-Concept.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/"
                        }
                    ],
                    "url": "http://packetstormsecurity.com/files/159190/Zerologon-Proof-Of-Concept.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18xs-py1v-xfey"
                        },
                        {
                            "vulnerability": "VCID-28rq-1d68-4bfz"
                        },
                        {
                            "vulnerability": "VCID-2w26-yjmn-k7an"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5cd3-497h-qkhw"
                        },
                        {
                            "vulnerability": "VCID-68zz-z589-87f6"
                        },
                        {
                            "vulnerability": "VCID-6mju-nwzy-pqeq"
                        },
                        {
                            "vulnerability": "VCID-745n-wca7-d7fh"
                        },
                        {
                            "vulnerability": "VCID-7xdg-sn88-bkbs"
                        },
                        {
                            "vulnerability": "VCID-84q8-2457-qkc5"
                        },
                        {
                            "vulnerability": "VCID-94k8-98me-x3dw"
                        },
                        {
                            "vulnerability": "VCID-apqw-e2px-yka5"
                        },
                        {
                            "vulnerability": "VCID-b4ty-d775-5fed"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-bpht-9daq-rfgd"
                        },
                        {
                            "vulnerability": "VCID-fskg-j9fe-6yeg"
                        },
                        {
                            "vulnerability": "VCID-hfsk-4cbd-m3b1"
                        },
                        {
                            "vulnerability": "VCID-kkwp-2x9m-9bgd"
                        },
                        {
                            "vulnerability": "VCID-q2d9-vahb-6qce"
                        },
                        {
                            "vulnerability": "VCID-r7va-6j6s-rba5"
                        },
                        {
                            "vulnerability": "VCID-w4c6-p858-rkaw"
                        },
                        {
                            "vulnerability": "VCID-wxva-f9ay-c3a2"
                        },
                        {
                            "vulnerability": "VCID-xmn1-g72k-8qcq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"
                }
            ],
            "aliases": [
                "CVE-2020-1472"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vnc5-neuk-m3ar"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/44829?format=api",
            "vulnerability_id": "VCID-vu43-fq85-a7eq",
            "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10730.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10730.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-10730",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86825",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86929",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8692",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86926",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86836",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86855",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86849",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86868",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86877",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8689",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86885",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8688",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86898",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86903",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-10730"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10730",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10730"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27840",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27840"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20277",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20277"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1849489",
                    "reference_id": "1849489",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1849489"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1202",
                    "reference_id": "AVG-1202",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1202"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202007-15",
                    "reference_id": "GLSA-202007-15",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202007-15"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3118",
                    "reference_id": "RHSA-2020:3118",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3118"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3119",
                    "reference_id": "RHSA-2020:3119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3119"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4568",
                    "reference_id": "RHSA-2020:4568",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4568"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4409-1/",
                    "reference_id": "USN-4409-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4409-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18xs-py1v-xfey"
                        },
                        {
                            "vulnerability": "VCID-28rq-1d68-4bfz"
                        },
                        {
                            "vulnerability": "VCID-2w26-yjmn-k7an"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5cd3-497h-qkhw"
                        },
                        {
                            "vulnerability": "VCID-68zz-z589-87f6"
                        },
                        {
                            "vulnerability": "VCID-6mju-nwzy-pqeq"
                        },
                        {
                            "vulnerability": "VCID-745n-wca7-d7fh"
                        },
                        {
                            "vulnerability": "VCID-7xdg-sn88-bkbs"
                        },
                        {
                            "vulnerability": "VCID-84q8-2457-qkc5"
                        },
                        {
                            "vulnerability": "VCID-94k8-98me-x3dw"
                        },
                        {
                            "vulnerability": "VCID-apqw-e2px-yka5"
                        },
                        {
                            "vulnerability": "VCID-b4ty-d775-5fed"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-bpht-9daq-rfgd"
                        },
                        {
                            "vulnerability": "VCID-fskg-j9fe-6yeg"
                        },
                        {
                            "vulnerability": "VCID-hfsk-4cbd-m3b1"
                        },
                        {
                            "vulnerability": "VCID-kkwp-2x9m-9bgd"
                        },
                        {
                            "vulnerability": "VCID-q2d9-vahb-6qce"
                        },
                        {
                            "vulnerability": "VCID-r7va-6j6s-rba5"
                        },
                        {
                            "vulnerability": "VCID-w4c6-p858-rkaw"
                        },
                        {
                            "vulnerability": "VCID-wxva-f9ay-c3a2"
                        },
                        {
                            "vulnerability": "VCID-xmn1-g72k-8qcq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"
                }
            ],
            "aliases": [
                "CVE-2020-10730"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vu43-fq85-a7eq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79829?format=api",
            "vulnerability_id": "VCID-wfhc-ehpe-abaq",
            "summary": "samba: Symlink race error can allow directory creation outside of the exported share",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43566.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43566.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-43566",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58129",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58215",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58235",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5821",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58264",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58269",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58287",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58263",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58243",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58275",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58277",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58252",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58217",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5823",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58216",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-43566"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43566",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43566"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004691",
                    "reference_id": "1004691",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004691"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2009676",
                    "reference_id": "2009676",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2009676"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5260-1/",
                    "reference_id": "USN-5260-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5260-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18xs-py1v-xfey"
                        },
                        {
                            "vulnerability": "VCID-28rq-1d68-4bfz"
                        },
                        {
                            "vulnerability": "VCID-2w26-yjmn-k7an"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5cd3-497h-qkhw"
                        },
                        {
                            "vulnerability": "VCID-68zz-z589-87f6"
                        },
                        {
                            "vulnerability": "VCID-6mju-nwzy-pqeq"
                        },
                        {
                            "vulnerability": "VCID-745n-wca7-d7fh"
                        },
                        {
                            "vulnerability": "VCID-7xdg-sn88-bkbs"
                        },
                        {
                            "vulnerability": "VCID-84q8-2457-qkc5"
                        },
                        {
                            "vulnerability": "VCID-94k8-98me-x3dw"
                        },
                        {
                            "vulnerability": "VCID-apqw-e2px-yka5"
                        },
                        {
                            "vulnerability": "VCID-b4ty-d775-5fed"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-bpht-9daq-rfgd"
                        },
                        {
                            "vulnerability": "VCID-fskg-j9fe-6yeg"
                        },
                        {
                            "vulnerability": "VCID-hfsk-4cbd-m3b1"
                        },
                        {
                            "vulnerability": "VCID-kkwp-2x9m-9bgd"
                        },
                        {
                            "vulnerability": "VCID-q2d9-vahb-6qce"
                        },
                        {
                            "vulnerability": "VCID-r7va-6j6s-rba5"
                        },
                        {
                            "vulnerability": "VCID-w4c6-p858-rkaw"
                        },
                        {
                            "vulnerability": "VCID-wxva-f9ay-c3a2"
                        },
                        {
                            "vulnerability": "VCID-xmn1-g72k-8qcq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"
                }
            ],
            "aliases": [
                "CVE-2021-43566"
            ],
            "risk_score": 1.1,
            "exploitability": "0.5",
            "weighted_severity": "2.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wfhc-ehpe-abaq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80058?format=api",
            "vulnerability_id": "VCID-ws2g-8ye2-pkdk",
            "summary": "samba: Null pointer dereference on missing sname in TGS-REQ",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3671.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3671.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3671",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86538",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86636",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.03013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86628",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86637",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.03013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86548",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86567",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86568",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86586",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86596",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8661",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86607",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86599",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86613",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86618",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3671"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013080",
                    "reference_id": "2013080",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013080"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=996586",
                    "reference_id": "996586",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=996586"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2418",
                    "reference_id": "AVG-2418",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2418"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5142-1/",
                    "reference_id": "USN-5142-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5142-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5174-1/",
                    "reference_id": "USN-5174-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5174-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5675-1/",
                    "reference_id": "USN-5675-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5675-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18xs-py1v-xfey"
                        },
                        {
                            "vulnerability": "VCID-28rq-1d68-4bfz"
                        },
                        {
                            "vulnerability": "VCID-2w26-yjmn-k7an"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5cd3-497h-qkhw"
                        },
                        {
                            "vulnerability": "VCID-68zz-z589-87f6"
                        },
                        {
                            "vulnerability": "VCID-6mju-nwzy-pqeq"
                        },
                        {
                            "vulnerability": "VCID-745n-wca7-d7fh"
                        },
                        {
                            "vulnerability": "VCID-7xdg-sn88-bkbs"
                        },
                        {
                            "vulnerability": "VCID-84q8-2457-qkc5"
                        },
                        {
                            "vulnerability": "VCID-94k8-98me-x3dw"
                        },
                        {
                            "vulnerability": "VCID-apqw-e2px-yka5"
                        },
                        {
                            "vulnerability": "VCID-b4ty-d775-5fed"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-bpht-9daq-rfgd"
                        },
                        {
                            "vulnerability": "VCID-fskg-j9fe-6yeg"
                        },
                        {
                            "vulnerability": "VCID-hfsk-4cbd-m3b1"
                        },
                        {
                            "vulnerability": "VCID-kkwp-2x9m-9bgd"
                        },
                        {
                            "vulnerability": "VCID-q2d9-vahb-6qce"
                        },
                        {
                            "vulnerability": "VCID-r7va-6j6s-rba5"
                        },
                        {
                            "vulnerability": "VCID-w4c6-p858-rkaw"
                        },
                        {
                            "vulnerability": "VCID-wxva-f9ay-c3a2"
                        },
                        {
                            "vulnerability": "VCID-xmn1-g72k-8qcq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"
                }
            ],
            "aliases": [
                "CVE-2021-3671"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ws2g-8ye2-pkdk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48496?format=api",
            "vulnerability_id": "VCID-xwke-mduk-kyga",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32744.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32744.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32744",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62128",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64831",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6482",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64792",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6483",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64841",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64828",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64787",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6475",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64799",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64814",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00516",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66718",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00516",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66717",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00516",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66704",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32744"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449",
                    "reference_id": "1016449",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108205",
                    "reference_id": "2108205",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108205"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2782",
                    "reference_id": "AVG-2782",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2782"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5542-1/",
                    "reference_id": "USN-5542-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5542-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18xs-py1v-xfey"
                        },
                        {
                            "vulnerability": "VCID-28rq-1d68-4bfz"
                        },
                        {
                            "vulnerability": "VCID-2w26-yjmn-k7an"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5cd3-497h-qkhw"
                        },
                        {
                            "vulnerability": "VCID-68zz-z589-87f6"
                        },
                        {
                            "vulnerability": "VCID-6mju-nwzy-pqeq"
                        },
                        {
                            "vulnerability": "VCID-745n-wca7-d7fh"
                        },
                        {
                            "vulnerability": "VCID-7xdg-sn88-bkbs"
                        },
                        {
                            "vulnerability": "VCID-84q8-2457-qkc5"
                        },
                        {
                            "vulnerability": "VCID-94k8-98me-x3dw"
                        },
                        {
                            "vulnerability": "VCID-apqw-e2px-yka5"
                        },
                        {
                            "vulnerability": "VCID-b4ty-d775-5fed"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-bpht-9daq-rfgd"
                        },
                        {
                            "vulnerability": "VCID-fskg-j9fe-6yeg"
                        },
                        {
                            "vulnerability": "VCID-hfsk-4cbd-m3b1"
                        },
                        {
                            "vulnerability": "VCID-kkwp-2x9m-9bgd"
                        },
                        {
                            "vulnerability": "VCID-q2d9-vahb-6qce"
                        },
                        {
                            "vulnerability": "VCID-r7va-6j6s-rba5"
                        },
                        {
                            "vulnerability": "VCID-w4c6-p858-rkaw"
                        },
                        {
                            "vulnerability": "VCID-wxva-f9ay-c3a2"
                        },
                        {
                            "vulnerability": "VCID-xmn1-g72k-8qcq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"
                }
            ],
            "aliases": [
                "CVE-2022-32744"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xwke-mduk-kyga"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47968?format=api",
            "vulnerability_id": "VCID-xyfs-p969-syfp",
            "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n    which could lead to remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19344.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19344.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19344",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02193",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8446",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.02308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84683",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84698",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84719",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8472",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84742",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84749",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84767",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84763",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84757",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84779",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8478",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84778",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84805",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84815",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19344"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19344",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19344"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1791204",
                    "reference_id": "1791204",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1791204"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=950499",
                    "reference_id": "950499",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=950499"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202003-52",
                    "reference_id": "GLSA-202003-52",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202003-52"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4244-1/",
                    "reference_id": "USN-4244-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4244-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18xs-py1v-xfey"
                        },
                        {
                            "vulnerability": "VCID-28rq-1d68-4bfz"
                        },
                        {
                            "vulnerability": "VCID-2w26-yjmn-k7an"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5cd3-497h-qkhw"
                        },
                        {
                            "vulnerability": "VCID-68zz-z589-87f6"
                        },
                        {
                            "vulnerability": "VCID-6mju-nwzy-pqeq"
                        },
                        {
                            "vulnerability": "VCID-745n-wca7-d7fh"
                        },
                        {
                            "vulnerability": "VCID-7xdg-sn88-bkbs"
                        },
                        {
                            "vulnerability": "VCID-84q8-2457-qkc5"
                        },
                        {
                            "vulnerability": "VCID-94k8-98me-x3dw"
                        },
                        {
                            "vulnerability": "VCID-apqw-e2px-yka5"
                        },
                        {
                            "vulnerability": "VCID-b4ty-d775-5fed"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-bpht-9daq-rfgd"
                        },
                        {
                            "vulnerability": "VCID-fskg-j9fe-6yeg"
                        },
                        {
                            "vulnerability": "VCID-hfsk-4cbd-m3b1"
                        },
                        {
                            "vulnerability": "VCID-kkwp-2x9m-9bgd"
                        },
                        {
                            "vulnerability": "VCID-q2d9-vahb-6qce"
                        },
                        {
                            "vulnerability": "VCID-r7va-6j6s-rba5"
                        },
                        {
                            "vulnerability": "VCID-w4c6-p858-rkaw"
                        },
                        {
                            "vulnerability": "VCID-wxva-f9ay-c3a2"
                        },
                        {
                            "vulnerability": "VCID-xmn1-g72k-8qcq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"
                }
            ],
            "aliases": [
                "CVE-2019-19344"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xyfs-p969-syfp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47962?format=api",
            "vulnerability_id": "VCID-ycau-9h17-quf3",
            "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n    which could lead to remote code execution.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00045.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00045.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10197.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10197.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10197",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89441",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8951",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89493",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89491",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89505",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89509",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89445",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89455",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89457",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89473",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89477",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89486",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89484",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89479",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10197"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10197",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10197"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10197",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10197"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/56ZUXHGDHPM7S6RVAKULZT5EATS37OKA/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/56ZUXHGDHPM7S6RVAKULZT5EATS37OKA/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7NYIUZOCIDXWXGWMZ7O5Z7OJ6IX7EAB/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7NYIUZOCIDXWXGWMZ7O5Z7OJ6IX7EAB/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z6EEKFT24DQI4DMZMSQTLMNZWG4RMZ57/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z6EEKFT24DQI4DMZMSQTLMNZWG4RMZ57/"
                },
                {
                    "reference_url": "https://seclists.org/bugtraq/2019/Sep/4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://seclists.org/bugtraq/2019/Sep/4"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20190903-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20190903-0001/"
                },
                {
                    "reference_url": "https://support.f5.com/csp/article/K69511801",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://support.f5.com/csp/article/K69511801"
                },
                {
                    "reference_url": "https://support.f5.com/csp/article/K69511801?utm_source=f5support&amp%3Butm_medium=RSS",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://support.f5.com/csp/article/K69511801?utm_source=f5support&amp%3Butm_medium=RSS"
                },
                {
                    "reference_url": "https://www.debian.org/security/2019/dsa-4513",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.debian.org/security/2019/dsa-4513"
                },
                {
                    "reference_url": "https://www.samba.org/samba/security/CVE-2019-10197.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.samba.org/samba/security/CVE-2019-10197.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1746225",
                    "reference_id": "1746225",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1746225"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.10.0:rc1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:samba:samba:4.10.0:rc1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.10.0:rc1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.10.0:rc2:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:samba:samba:4.10.0:rc2:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.10.0:rc2:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.10.0:rc3:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:samba:samba:4.10.0:rc3:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.10.0:rc3:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.10.0:rc4:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:samba:samba:4.10.0:rc4:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.10.0:rc4:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.11.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:samba:samba:4.11.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.11.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.11.0:rc1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:samba:samba:4.11.0:rc1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.11.0:rc1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.11.0:rc2:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:samba:samba:4.11.0:rc2:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.11.0:rc2:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.11.0:rc3:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:samba:samba:4.11.0:rc3:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.11.0:rc3:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.9.0:rc1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:samba:samba:4.9.0:rc1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.9.0:rc1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.9.0:rc2:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:samba:samba:4.9.0:rc2:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.9.0:rc2:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.9.0:rc3:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:samba:samba:4.9.0:rc3:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.9.0:rc3:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.9.0:rc4:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:samba:samba:4.9.0:rc4:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.9.0:rc4:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.9.0:rc5:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:samba:samba:4.9.0:rc5:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.9.0:rc5:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10197",
                    "reference_id": "CVE-2019-10197",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:N"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10197"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202003-52",
                    "reference_id": "GLSA-202003-52",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202003-52"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:3253",
                    "reference_id": "RHSA-2019:3253",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:3253"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:4023",
                    "reference_id": "RHSA-2019:4023",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:4023"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1084",
                    "reference_id": "RHSA-2020:1084",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1084"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1878",
                    "reference_id": "RHSA-2020:1878",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1878"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4121-1/",
                    "reference_id": "USN-4121-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4121-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1038160?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.9.5%2Bdfsg-5%2Bdeb10u3",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2dm7-xt4e-wkex"
                        },
                        {
                            "vulnerability": "VCID-2gkd-vubu-j7fd"
                        },
                        {
                            "vulnerability": "VCID-47k4-8k1s-zff2"
                        },
                        {
                            "vulnerability": "VCID-4qm6-a9un-nyda"
                        },
                        {
                            "vulnerability": "VCID-55zj-6b4s-8ker"
                        },
                        {
                            "vulnerability": "VCID-5vyg-1jzr-ebh8"
                        },
                        {
                            "vulnerability": "VCID-745n-wca7-d7fh"
                        },
                        {
                            "vulnerability": "VCID-76sz-d2yt-buek"
                        },
                        {
                            "vulnerability": "VCID-7bb1-3ny6-rbbv"
                        },
                        {
                            "vulnerability": "VCID-88mw-c7mc-jugp"
                        },
                        {
                            "vulnerability": "VCID-9cyh-d77a-vyhj"
                        },
                        {
                            "vulnerability": "VCID-9t1m-6chr-e3dt"
                        },
                        {
                            "vulnerability": "VCID-cgez-urtv-qbhq"
                        },
                        {
                            "vulnerability": "VCID-crh2-zv3e-pfaa"
                        },
                        {
                            "vulnerability": "VCID-ez9s-vn2t-w7a6"
                        },
                        {
                            "vulnerability": "VCID-ezk6-jy86-y3h4"
                        },
                        {
                            "vulnerability": "VCID-f772-3dtd-wba8"
                        },
                        {
                            "vulnerability": "VCID-f9hv-k2xk-puhq"
                        },
                        {
                            "vulnerability": "VCID-fh3j-efv1-tybp"
                        },
                        {
                            "vulnerability": "VCID-frnd-3wwy-93ek"
                        },
                        {
                            "vulnerability": "VCID-gs98-hcdd-2yf9"
                        },
                        {
                            "vulnerability": "VCID-hnhm-ud2a-nugz"
                        },
                        {
                            "vulnerability": "VCID-hzy4-16j5-8qcf"
                        },
                        {
                            "vulnerability": "VCID-m44e-rw2w-vuhj"
                        },
                        {
                            "vulnerability": "VCID-mgaq-qjdw-fke4"
                        },
                        {
                            "vulnerability": "VCID-mw6j-fkm4-pkg2"
                        },
                        {
                            "vulnerability": "VCID-p1se-92ae-t3b5"
                        },
                        {
                            "vulnerability": "VCID-qt4e-73xg-bqde"
                        },
                        {
                            "vulnerability": "VCID-rgu3-rgej-aucp"
                        },
                        {
                            "vulnerability": "VCID-rnfg-1cgy-jbaq"
                        },
                        {
                            "vulnerability": "VCID-rphh-hzna-nbgf"
                        },
                        {
                            "vulnerability": "VCID-s2ne-rcp3-nbgz"
                        },
                        {
                            "vulnerability": "VCID-s6ma-9h2y-hyc4"
                        },
                        {
                            "vulnerability": "VCID-smxs-4de1-nfec"
                        },
                        {
                            "vulnerability": "VCID-t3zy-v34p-7uen"
                        },
                        {
                            "vulnerability": "VCID-tk1x-bex4-8kbz"
                        },
                        {
                            "vulnerability": "VCID-vg7n-k8px-ayd5"
                        },
                        {
                            "vulnerability": "VCID-vnc5-neuk-m3ar"
                        },
                        {
                            "vulnerability": "VCID-vu43-fq85-a7eq"
                        },
                        {
                            "vulnerability": "VCID-wfhc-ehpe-abaq"
                        },
                        {
                            "vulnerability": "VCID-ws2g-8ye2-pkdk"
                        },
                        {
                            "vulnerability": "VCID-xwke-mduk-kyga"
                        },
                        {
                            "vulnerability": "VCID-xyfs-p969-syfp"
                        },
                        {
                            "vulnerability": "VCID-ycau-9h17-quf3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-5%252Bdeb10u3"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/994567?format=api",
                    "purl": "pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18xs-py1v-xfey"
                        },
                        {
                            "vulnerability": "VCID-28rq-1d68-4bfz"
                        },
                        {
                            "vulnerability": "VCID-2w26-yjmn-k7an"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5cd3-497h-qkhw"
                        },
                        {
                            "vulnerability": "VCID-68zz-z589-87f6"
                        },
                        {
                            "vulnerability": "VCID-6mju-nwzy-pqeq"
                        },
                        {
                            "vulnerability": "VCID-745n-wca7-d7fh"
                        },
                        {
                            "vulnerability": "VCID-7xdg-sn88-bkbs"
                        },
                        {
                            "vulnerability": "VCID-84q8-2457-qkc5"
                        },
                        {
                            "vulnerability": "VCID-94k8-98me-x3dw"
                        },
                        {
                            "vulnerability": "VCID-apqw-e2px-yka5"
                        },
                        {
                            "vulnerability": "VCID-b4ty-d775-5fed"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-bpht-9daq-rfgd"
                        },
                        {
                            "vulnerability": "VCID-fskg-j9fe-6yeg"
                        },
                        {
                            "vulnerability": "VCID-hfsk-4cbd-m3b1"
                        },
                        {
                            "vulnerability": "VCID-kkwp-2x9m-9bgd"
                        },
                        {
                            "vulnerability": "VCID-q2d9-vahb-6qce"
                        },
                        {
                            "vulnerability": "VCID-r7va-6j6s-rba5"
                        },
                        {
                            "vulnerability": "VCID-w4c6-p858-rkaw"
                        },
                        {
                            "vulnerability": "VCID-wxva-f9ay-c3a2"
                        },
                        {
                            "vulnerability": "VCID-xmn1-g72k-8qcq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"
                }
            ],
            "aliases": [
                "CVE-2019-10197"
            ],
            "risk_score": 4.1,
            "exploitability": "0.5",
            "weighted_severity": "8.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ycau-9h17-quf3"
        }
    ],
    "risk_score": "4.5",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"
}