{"url":"http://public2.vulnerablecode.io/api/packages/994567?format=json","purl":"pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6","type":"deb","namespace":"debian","name":"samba","version":"2:4.13.13+dfsg-1~deb11u6","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"2:4.17.12+dfsg-0+deb12u2","latest_non_vulnerable_version":"2:4.17.12+dfsg-0+deb12u2","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48504?format=json","vulnerability_id":"VCID-18xs-py1v-xfey","summary":"Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0225.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0225.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0225","reference_id":"","reference_type":"","scores":[{"value":"0.00355","scoring_system":"epss","scoring_elements":"0.57853","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00355","scoring_system":"epss","scoring_elements":"0.57823","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00355","scoring_system":"epss","scoring_elements":"0.57798","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00355","scoring_system":"epss","scoring_elements":"0.57854","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00355","scoring_system":"epss","scoring_elements":"0.5787","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00355","scoring_system":"epss","scoring_elements":"0.57849","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00355","scoring_system":"epss","scoring_elements":"0.57828","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00355","scoring_system":"epss","scoring_elements":"0.57857","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00355","scoring_system":"epss","scoring_elements":"0.57856","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61491","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61507","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61502","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61505","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64299","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0225"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0225","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0225"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2182772","reference_id":"2182772","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2182772"},{"reference_url":"https://www.samba.org/samba/security/CVE-2023-0225.html","reference_id":"CVE-2023-0225.html","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-18T15:04:24Z/"}],"url":"https://www.samba.org/samba/security/CVE-2023-0225.html"},{"reference_url":"https://security.gentoo.org/glsa/202309-06","reference_id":"GLSA-202309-06","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-18T15:04:24Z/"}],"url":"https://security.gentoo.org/glsa/202309-06"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230406-0007/","reference_id":"ntap-20230406-0007","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-18T15:04:24Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230406-0007/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994568?format=json","purl":"pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u2"}],"aliases":["CVE-2023-0225"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-18xs-py1v-xfey"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/45505?format=json","vulnerability_id":"VCID-28rq-1d68-4bfz","summary":"Multiple vulnerabilities have been found in Samba, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27840.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27840.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-27840","reference_id":"","reference_type":"","scores":[{"value":"0.14523","scoring_system":"epss","scoring_elements":"0.94417","published_at":"2026-04-01T12:55:00Z"},{"value":"0.14523","scoring_system":"epss","scoring_elements":"0.94478","published_at":"2026-04-24T12:55:00Z"},{"value":"0.14523","scoring_system":"epss","scoring_elements":"0.94469","published_at":"2026-04-16T12:55:00Z"},{"value":"0.14523","scoring_system":"epss","scoring_elements":"0.94474","published_at":"2026-04-18T12:55:00Z"},{"value":"0.14523","scoring_system":"epss","scoring_elements":"0.94477","published_at":"2026-04-29T12:55:00Z"},{"value":"0.14523","scoring_system":"epss","scoring_elements":"0.94424","published_at":"2026-04-02T12:55:00Z"},{"value":"0.14523","scoring_system":"epss","scoring_elements":"0.94435","published_at":"2026-04-04T12:55:00Z"},{"value":"0.14523","scoring_system":"epss","scoring_elements":"0.94437","published_at":"2026-04-07T12:55:00Z"},{"value":"0.14523","scoring_system":"epss","scoring_elements":"0.94447","published_at":"2026-04-08T12:55:00Z"},{"value":"0.14523","scoring_system":"epss","scoring_elements":"0.9445","published_at":"2026-04-09T12:55:00Z"},{"value":"0.14523","scoring_system":"epss","scoring_elements":"0.94453","published_at":"2026-04-11T12:55:00Z"},{"value":"0.14523","scoring_system":"epss","scoring_elements":"0.94455","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-27840"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10730","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10730"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27840","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27840"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20277","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20277"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1941400","reference_id":"1941400","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1941400"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985936","reference_id":"985936","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985936"},{"reference_url":"https://security.archlinux.org/AVG-1732","reference_id":"AVG-1732","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1732"},{"reference_url":"https://security.archlinux.org/AVG-1734","reference_id":"AVG-1734","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1734"},{"reference_url":"https://security.gentoo.org/glsa/202105-22","reference_id":"GLSA-202105-22","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202105-22"},{"reference_url":"https://usn.ubuntu.com/4888-1/","reference_id":"USN-4888-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4888-1/"},{"reference_url":"https://usn.ubuntu.com/4888-2/","reference_id":"USN-4888-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4888-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994568?format=json","purl":"pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u2"}],"aliases":["CVE-2020-27840"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-28rq-1d68-4bfz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/45507?format=json","vulnerability_id":"VCID-2w26-yjmn-k7an","summary":"Multiple vulnerabilities have been found in Samba, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20277.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20277.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-20277","reference_id":"","reference_type":"","scores":[{"value":"0.08492","scoring_system":"epss","scoring_elements":"0.92332","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08492","scoring_system":"epss","scoring_elements":"0.92387","published_at":"2026-04-26T12:55:00Z"},{"value":"0.08492","scoring_system":"epss","scoring_elements":"0.9238","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08492","scoring_system":"epss","scoring_elements":"0.92382","published_at":"2026-04-21T12:55:00Z"},{"value":"0.08492","scoring_system":"epss","scoring_elements":"0.92386","published_at":"2026-04-24T12:55:00Z"},{"value":"0.08492","scoring_system":"epss","scoring_elements":"0.92339","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08492","scoring_system":"epss","scoring_elements":"0.92344","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08492","scoring_system":"epss","scoring_elements":"0.92348","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08492","scoring_system":"epss","scoring_elements":"0.92359","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08492","scoring_system":"epss","scoring_elements":"0.92364","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08492","scoring_system":"epss","scoring_elements":"0.92369","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08492","scoring_system":"epss","scoring_elements":"0.92371","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08492","scoring_system":"epss","scoring_elements":"0.92381","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-20277"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10730","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10730"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27840","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27840"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20277","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20277"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1941402","reference_id":"1941402","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1941402"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985935","reference_id":"985935","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985935"},{"reference_url":"https://security.archlinux.org/AVG-1732","reference_id":"AVG-1732","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1732"},{"reference_url":"https://security.archlinux.org/AVG-1734","reference_id":"AVG-1734","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1734"},{"reference_url":"https://security.gentoo.org/glsa/202105-22","reference_id":"GLSA-202105-22","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202105-22"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1072","reference_id":"RHSA-2021:1072","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1072"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1197","reference_id":"RHSA-2021:1197","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1197"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1213","reference_id":"RHSA-2021:1213","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1213"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1214","reference_id":"RHSA-2021:1214","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1214"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2331","reference_id":"RHSA-2021:2331","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2331"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2786","reference_id":"RHSA-2021:2786","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2786"},{"reference_url":"https://usn.ubuntu.com/4888-1/","reference_id":"USN-4888-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4888-1/"},{"reference_url":"https://usn.ubuntu.com/4888-2/","reference_id":"USN-4888-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4888-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994568?format=json","purl":"pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u2"}],"aliases":["CVE-2021-20277"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2w26-yjmn-k7an"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47300?format=json","vulnerability_id":"VCID-3du2-evy8-jfa1","summary":"Multiple vulnerabilities have been discovered in MIT krb5, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42898.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42898.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42898","reference_id":"","reference_type":"","scores":[{"value":"0.08257","scoring_system":"epss","scoring_elements":"0.92245","published_at":"2026-04-21T12:55:00Z"},{"value":"0.08257","scoring_system":"epss","scoring_elements":"0.9225","published_at":"2026-04-26T12:55:00Z"},{"value":"0.08257","scoring_system":"epss","scoring_elements":"0.92249","published_at":"2026-04-24T12:55:00Z"},{"value":"0.08734","scoring_system":"epss","scoring_elements":"0.92515","published_at":"2026-04-29T12:55:00Z"},{"value":"0.08889","scoring_system":"epss","scoring_elements":"0.9254","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08889","scoring_system":"epss","scoring_elements":"0.92532","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08889","scoring_system":"epss","scoring_elements":"0.92575","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08889","scoring_system":"epss","scoring_elements":"0.92565","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08889","scoring_system":"epss","scoring_elements":"0.92564","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08889","scoring_system":"epss","scoring_elements":"0.92558","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08889","scoring_system":"epss","scoring_elements":"0.92553","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08889","scoring_system":"epss","scoring_elements":"0.92542","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187","reference_id":"1024187","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024267","reference_id":"1024267","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024267"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2140960","reference_id":"2140960","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2140960"},{"reference_url":"https://web.mit.edu/kerberos/advisories/","reference_id":"advisories","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"}],"url":"https://web.mit.edu/kerberos/advisories/"},{"reference_url":"https://security.archlinux.org/AVG-2828","reference_id":"AVG-2828","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2828"},{"reference_url":"https://www.samba.org/samba/security/CVE-2022-42898.html","reference_id":"CVE-2022-42898.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"}],"url":"https://www.samba.org/samba/security/CVE-2022-42898.html"},{"reference_url":"https://github.com/krb5/krb5/commit/ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583","reference_id":"ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"}],"url":"https://github.com/krb5/krb5/commit/ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583"},{"reference_url":"https://github.com/heimdal/heimdal/security/advisories/GHSA-64mq-fvfj-5x3c","reference_id":"GHSA-64mq-fvfj-5x3c","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"}],"url":"https://github.com/heimdal/heimdal/security/advisories/GHSA-64mq-fvfj-5x3c"},{"reference_url":"https://security.gentoo.org/glsa/202309-06","reference_id":"GLSA-202309-06","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"}],"url":"https://security.gentoo.org/glsa/202309-06"},{"reference_url":"https://security.gentoo.org/glsa/202310-06","reference_id":"GLSA-202310-06","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"}],"url":"https://security.gentoo.org/glsa/202310-06"},{"reference_url":"https://security.gentoo.org/glsa/202405-11","reference_id":"GLSA-202405-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-11"},{"reference_url":"https://web.mit.edu/kerberos/krb5-1.19/","reference_id":"krb5-1.19","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"}],"url":"https://web.mit.edu/kerberos/krb5-1.19/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230216-0008/","reference_id":"ntap-20230216-0008","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230216-0008/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230223-0001/","reference_id":"ntap-20230223-0001","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230223-0001/"},{"reference_url":"https://web.mit.edu/kerberos/krb5-1.20/README-1.20.1.txt","reference_id":"README-1.20.1.txt","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"}],"url":"https://web.mit.edu/kerberos/krb5-1.20/README-1.20.1.txt"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8637","reference_id":"RHSA-2022:8637","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8637"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8638","reference_id":"RHSA-2022:8638","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8638"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8639","reference_id":"RHSA-2022:8639","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8639"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8640","reference_id":"RHSA-2022:8640","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8640"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8641","reference_id":"RHSA-2022:8641","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8641"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8648","reference_id":"RHSA-2022:8648","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8648"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8662","reference_id":"RHSA-2022:8662","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8662"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8663","reference_id":"RHSA-2022:8663","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8663"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8669","reference_id":"RHSA-2022:8669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8669"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:9029","reference_id":"RHSA-2022:9029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:9029"},{"reference_url":"https://bugzilla.samba.org/show_bug.cgi?id=15203","reference_id":"show_bug.cgi?id=15203","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"}],"url":"https://bugzilla.samba.org/show_bug.cgi?id=15203"},{"reference_url":"https://usn.ubuntu.com/5800-1/","reference_id":"USN-5800-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5800-1/"},{"reference_url":"https://usn.ubuntu.com/5822-1/","reference_id":"USN-5822-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5822-1/"},{"reference_url":"https://usn.ubuntu.com/5828-1/","reference_id":"USN-5828-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5828-1/"},{"reference_url":"https://usn.ubuntu.com/5936-1/","reference_id":"USN-5936-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5936-1/"},{"reference_url":"https://usn.ubuntu.com/7582-1/","reference_id":"USN-7582-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7582-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994568?format=json","purl":"pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u2"}],"aliases":["CVE-2022-42898"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3du2-evy8-jfa1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48502?format=json","vulnerability_id":"VCID-5cd3-497h-qkhw","summary":"Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38023.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38023.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-38023","reference_id":"","reference_type":"","scores":[{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.57804","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.57757","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.5773","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.57785","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.57787","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.57782","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.57761","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.57789","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.57735","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65162","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65149","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65163","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.6515","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65134","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-38023"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38023","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38023"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2154362","reference_id":"2154362","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2154362"},{"reference_url":"https://security.archlinux.org/AVG-2828","reference_id":"AVG-2828","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2828"},{"reference_url":"https://security.gentoo.org/glsa/202309-06","reference_id":"GLSA-202309-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202309-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0637","reference_id":"RHSA-2023:0637","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0637"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0638","reference_id":"RHSA-2023:0638","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0638"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0639","reference_id":"RHSA-2023:0639","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0639"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0838","reference_id":"RHSA-2023:0838","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0838"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1090","reference_id":"RHSA-2023:1090","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1090"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2127","reference_id":"RHSA-2023:2127","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2127"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2136","reference_id":"RHSA-2023:2136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2137","reference_id":"RHSA-2023:2137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2137"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3491","reference_id":"RHSA-2023:3491","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3491"},{"reference_url":"https://usn.ubuntu.com/5822-1/","reference_id":"USN-5822-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5822-1/"},{"reference_url":"https://usn.ubuntu.com/5936-1/","reference_id":"USN-5936-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5936-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994568?format=json","purl":"pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u2"}],"aliases":["CVE-2022-38023"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5cd3-497h-qkhw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66870?format=json","vulnerability_id":"VCID-68zz-z589-87f6","summary":"samba: Command Injection in WINS Server Hook Script","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-10230.json","reference_id":"","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-10230.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-10230","reference_id":"","reference_type":"","scores":[{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50239","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50186","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50232","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.5026","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50234","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50222","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50267","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51223","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51198","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59395","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59376","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59353","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59373","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59357","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-10230"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10230","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10230"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2394377","reference_id":"2394377","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-11-08T04:55:22Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2394377"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4","reference_id":"cpe:/a:redhat:openshift:4","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10","reference_id":"cpe:/o:redhat:enterprise_linux:10","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9","reference_id":"cpe:/o:redhat:enterprise_linux:9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-10230","reference_id":"CVE-2025-10230","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-11-08T04:55:22Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-10230"},{"reference_url":"https://www.samba.org/samba/history/security.html","reference_id":"security.html","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-11-08T04:55:22Z/"}],"url":"https://www.samba.org/samba/history/security.html"},{"reference_url":"https://usn.ubuntu.com/7826-1/","reference_id":"USN-7826-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7826-1/"},{"reference_url":"https://usn.ubuntu.com/7826-2/","reference_id":"USN-7826-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7826-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994568?format=json","purl":"pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u2"}],"aliases":["CVE-2025-10230"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-68zz-z589-87f6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48494?format=json","vulnerability_id":"VCID-6mju-nwzy-pqeq","summary":"Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32743.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32743.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32743","reference_id":"","reference_type":"","scores":[{"value":"0.01153","scoring_system":"epss","scoring_elements":"0.78461","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01153","scoring_system":"epss","scoring_elements":"0.78492","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01153","scoring_system":"epss","scoring_elements":"0.78475","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01153","scoring_system":"epss","scoring_elements":"0.78502","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01153","scoring_system":"epss","scoring_elements":"0.78507","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01153","scoring_system":"epss","scoring_elements":"0.78532","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01153","scoring_system":"epss","scoring_elements":"0.78514","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01153","scoring_system":"epss","scoring_elements":"0.78506","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01153","scoring_system":"epss","scoring_elements":"0.78534","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01153","scoring_system":"epss","scoring_elements":"0.78533","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01153","scoring_system":"epss","scoring_elements":"0.78531","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01153","scoring_system":"epss","scoring_elements":"0.78564","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01153","scoring_system":"epss","scoring_elements":"0.78571","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01153","scoring_system":"epss","scoring_elements":"0.78588","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32743"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021022","reference_id":"1021022","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021022"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2121128","reference_id":"2121128","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2121128"},{"reference_url":"https://security.gentoo.org/glsa/202309-06","reference_id":"GLSA-202309-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202309-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994568?format=json","purl":"pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u2"}],"aliases":["CVE-2022-32743"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6mju-nwzy-pqeq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66871?format=json","vulnerability_id":"VCID-745n-wca7-d7fh","summary":"samba: vfs_streams_xattr uninitialized memory write possible","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-9640.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-9640.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-9640","reference_id":"","reference_type":"","scores":[{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.2274","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23062","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22965","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22958","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22922","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22752","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22747","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23106","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22898","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.2297","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23023","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23042","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23004","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22949","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-9640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9640"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2391698","reference_id":"2391698","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-15T13:06:54Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2391698"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4","reference_id":"cpe:/a:redhat:openshift:4","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10","reference_id":"cpe:/o:redhat:enterprise_linux:10","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9","reference_id":"cpe:/o:redhat:enterprise_linux:9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-9640","reference_id":"CVE-2025-9640","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-15T13:06:54Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-9640"},{"reference_url":"https://www.samba.org/samba/history/security.html","reference_id":"security.html","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-15T13:06:54Z/"}],"url":"https://www.samba.org/samba/history/security.html"},{"reference_url":"https://usn.ubuntu.com/7826-1/","reference_id":"USN-7826-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7826-1/"},{"reference_url":"https://usn.ubuntu.com/7826-2/","reference_id":"USN-7826-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7826-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994568?format=json","purl":"pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u2"}],"aliases":["CVE-2025-9640"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-745n-wca7-d7fh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48503?format=json","vulnerability_id":"VCID-7xdg-sn88-bkbs","summary":"Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45141.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45141.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45141","reference_id":"","reference_type":"","scores":[{"value":"0.0067","scoring_system":"epss","scoring_elements":"0.71425","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0067","scoring_system":"epss","scoring_elements":"0.71328","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0067","scoring_system":"epss","scoring_elements":"0.71374","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0067","scoring_system":"epss","scoring_elements":"0.71381","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0067","scoring_system":"epss","scoring_elements":"0.71361","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0067","scoring_system":"epss","scoring_elements":"0.71413","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0067","scoring_system":"epss","scoring_elements":"0.71421","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0067","scoring_system":"epss","scoring_elements":"0.7129","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0067","scoring_system":"epss","scoring_elements":"0.71308","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0067","scoring_system":"epss","scoring_elements":"0.71282","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0067","scoring_system":"epss","scoring_elements":"0.71324","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0067","scoring_system":"epss","scoring_elements":"0.71337","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0067","scoring_system":"epss","scoring_elements":"0.7136","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0067","scoring_system":"epss","scoring_elements":"0.71345","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45141"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45141","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45141"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2154376","reference_id":"2154376","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2154376"},{"reference_url":"https://security.archlinux.org/AVG-2828","reference_id":"AVG-2828","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2828"},{"reference_url":"https://www.samba.org/samba/security/CVE-2022-45141.html","reference_id":"CVE-2022-45141.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-03-06T20:38:03Z/"}],"url":"https://www.samba.org/samba/security/CVE-2022-45141.html"},{"reference_url":"https://security.gentoo.org/glsa/202309-06","reference_id":"GLSA-202309-06","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-03-06T20:38:03Z/"}],"url":"https://security.gentoo.org/glsa/202309-06"},{"reference_url":"https://usn.ubuntu.com/5822-1/","reference_id":"USN-5822-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5822-1/"},{"reference_url":"https://usn.ubuntu.com/5936-1/","reference_id":"USN-5936-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5936-1/"},{"reference_url":"https://usn.ubuntu.com/7582-1/","reference_id":"USN-7582-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7582-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994568?format=json","purl":"pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u2"}],"aliases":["CVE-2022-45141"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7xdg-sn88-bkbs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48501?format=json","vulnerability_id":"VCID-84q8-2457-qkc5","summary":"Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-37967.json","reference_id":"","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-37967.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-37967","reference_id":"","reference_type":"","scores":[{"value":"0.02981","scoring_system":"epss","scoring_elements":"0.86566","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02981","scoring_system":"epss","scoring_elements":"0.86547","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02981","scoring_system":"epss","scoring_elements":"0.8654","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02981","scoring_system":"epss","scoring_elements":"0.86558","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02981","scoring_system":"epss","scoring_elements":"0.86567","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02981","scoring_system":"epss","scoring_elements":"0.86474","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02981","scoring_system":"epss","scoring_elements":"0.86492","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02981","scoring_system":"epss","scoring_elements":"0.86511","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02981","scoring_system":"epss","scoring_elements":"0.8652","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02981","scoring_system":"epss","scoring_elements":"0.86535","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02981","scoring_system":"epss","scoring_elements":"0.86532","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02981","scoring_system":"epss","scoring_elements":"0.86526","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02981","scoring_system":"epss","scoring_elements":"0.86541","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-37967"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37967","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37967"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2154320","reference_id":"2154320","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2154320"},{"reference_url":"https://security.archlinux.org/AVG-2828","reference_id":"AVG-2828","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2828"},{"reference_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37967","reference_id":"CVE-2022-37967","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T13:57:00Z/"}],"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37967"},{"reference_url":"https://security.gentoo.org/glsa/202309-06","reference_id":"GLSA-202309-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202309-06"},{"reference_url":"https://usn.ubuntu.com/5822-1/","reference_id":"USN-5822-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5822-1/"},{"reference_url":"https://usn.ubuntu.com/5936-1/","reference_id":"USN-5936-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5936-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994568?format=json","purl":"pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u2"}],"aliases":["CVE-2022-37967"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-84q8-2457-qkc5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48484?format=json","vulnerability_id":"VCID-94k8-98me-x3dw","summary":"Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44141.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44141.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-44141","reference_id":"","reference_type":"","scores":[{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.54","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.54042","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.54024","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.54064","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.54068","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.54051","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.54018","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.54029","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.54013","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.5406","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54041","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.5407","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.53997","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54015","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54018","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-44141"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44141","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44141"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004692","reference_id":"1004692","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004692"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2046120","reference_id":"2046120","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2046120"},{"reference_url":"https://security.archlinux.org/AVG-2648","reference_id":"AVG-2648","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2648"},{"reference_url":"https://security.gentoo.org/glsa/202309-06","reference_id":"GLSA-202309-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202309-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1756","reference_id":"RHSA-2022:1756","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1756"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:2074","reference_id":"RHSA-2022:2074","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:2074"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994568?format=json","purl":"pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u2"}],"aliases":["CVE-2021-44141"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-94k8-98me-x3dw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46961?format=json","vulnerability_id":"VCID-apqw-e2px-yka5","summary":"Multiple vulnerabilities have been discovered in Samba, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14628.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14628.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14628","reference_id":"","reference_type":"","scores":[{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.65978","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.6602","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66049","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66016","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66065","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66078","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66097","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66084","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66054","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66089","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66104","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66091","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66112","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66123","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66121","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14628"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034803","reference_id":"1034803","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034803"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1625445","reference_id":"1625445","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1625445"},{"reference_url":"https://security.gentoo.org/glsa/202402-28","reference_id":"GLSA-202402-28","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-28"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994568?format=json","purl":"pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u2"}],"aliases":["CVE-2018-14628"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-apqw-e2px-yka5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48487?format=json","vulnerability_id":"VCID-b4ty-d775-5fed","summary":"Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1615.json","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1615.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1615","reference_id":"","reference_type":"","scores":[{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49261","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50175","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50161","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50167","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51911","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51965","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51964","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.52015","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51998","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51982","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.52024","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.5203","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51872","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.5192","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51947","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1615"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021024","reference_id":"1021024","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021024"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2122649","reference_id":"2122649","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2122649"},{"reference_url":"https://security.gentoo.org/glsa/202309-06","reference_id":"GLSA-202309-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202309-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2519","reference_id":"RHSA-2023:2519","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2519"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2987","reference_id":"RHSA-2023:2987","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2987"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0423","reference_id":"RHSA-2024:0423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0423"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994568?format=json","purl":"pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u2"}],"aliases":["CVE-2022-1615"],"risk_score":2.3,"exploitability":"0.5","weighted_severity":"4.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b4ty-d775-5fed"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49839?format=json","vulnerability_id":"VCID-bc1t-hzu5-bffd","summary":"Multiple vulnerabilities have been discovered in Heimdal, the worst of which could lead to remote code execution on a KDC.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-44640","reference_id":"","reference_type":"","scores":[{"value":"0.01189","scoring_system":"epss","scoring_elements":"0.78771","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01189","scoring_system":"epss","scoring_elements":"0.78824","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01189","scoring_system":"epss","scoring_elements":"0.78815","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01189","scoring_system":"epss","scoring_elements":"0.78843","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01189","scoring_system":"epss","scoring_elements":"0.7884","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01189","scoring_system":"epss","scoring_elements":"0.78838","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01189","scoring_system":"epss","scoring_elements":"0.78866","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01189","scoring_system":"epss","scoring_elements":"0.78873","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01189","scoring_system":"epss","scoring_elements":"0.78803","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01189","scoring_system":"epss","scoring_elements":"0.78785","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01189","scoring_system":"epss","scoring_elements":"0.7881","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01189","scoring_system":"epss","scoring_elements":"0.78818","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01189","scoring_system":"epss","scoring_elements":"0.78841","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01265","scoring_system":"epss","scoring_elements":"0.79535","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-44640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187","reference_id":"1024187","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187"},{"reference_url":"https://github.com/heimdal/heimdal/security/advisories/GHSA-88pm-hfmq-7vv4","reference_id":"GHSA-88pm-hfmq-7vv4","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T13:20:08Z/"}],"url":"https://github.com/heimdal/heimdal/security/advisories/GHSA-88pm-hfmq-7vv4"},{"reference_url":"https://security.gentoo.org/glsa/202310-06","reference_id":"GLSA-202310-06","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T13:20:08Z/"}],"url":"https://security.gentoo.org/glsa/202310-06"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230216-0008/","reference_id":"ntap-20230216-0008","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T13:20:08Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230216-0008/"},{"reference_url":"https://usn.ubuntu.com/5800-1/","reference_id":"USN-5800-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5800-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994568?format=json","purl":"pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u2"}],"aliases":["CVE-2022-44640"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bc1t-hzu5-bffd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48507?format=json","vulnerability_id":"VCID-bpht-9daq-rfgd","summary":"Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0922.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0922.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0922","reference_id":"","reference_type":"","scores":[{"value":"0.00229","scoring_system":"epss","scoring_elements":"0.45679","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00229","scoring_system":"epss","scoring_elements":"0.45699","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00229","scoring_system":"epss","scoring_elements":"0.45647","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00229","scoring_system":"epss","scoring_elements":"0.45703","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00229","scoring_system":"epss","scoring_elements":"0.45722","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00229","scoring_system":"epss","scoring_elements":"0.45692","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00229","scoring_system":"epss","scoring_elements":"0.457","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00229","scoring_system":"epss","scoring_elements":"0.45749","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00229","scoring_system":"epss","scoring_elements":"0.45744","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50098","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50085","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50089","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50043","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0922"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0922","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0922"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2182774","reference_id":"2182774","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2182774"},{"reference_url":"https://www.samba.org/samba/security/CVE-2023-0922.html","reference_id":"CVE-2023-0922.html","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T14:54:28Z/"}],"url":"https://www.samba.org/samba/security/CVE-2023-0922.html"},{"reference_url":"https://security.gentoo.org/glsa/202309-06","reference_id":"GLSA-202309-06","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T14:54:28Z/"}],"url":"https://security.gentoo.org/glsa/202309-06"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230406-0007/","reference_id":"ntap-20230406-0007","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T14:54:28Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230406-0007/"},{"reference_url":"https://usn.ubuntu.com/5993-1/","reference_id":"USN-5993-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5993-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YXBPYIA4VWNOD437NAHZ3NXKAETLFB5S/","reference_id":"YXBPYIA4VWNOD437NAHZ3NXKAETLFB5S","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T14:54:28Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YXBPYIA4VWNOD437NAHZ3NXKAETLFB5S/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994568?format=json","purl":"pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u2"}],"aliases":["CVE-2023-0922"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bpht-9daq-rfgd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48481?format=json","vulnerability_id":"VCID-fskg-j9fe-6yeg","summary":"Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20251.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20251.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-20251","reference_id":"","reference_type":"","scores":[{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44742","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44822","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.4465","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44879","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44872","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44807","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.4472","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44727","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44843","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44783","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44836","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44838","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44855","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44824","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44826","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-20251"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20251","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20251"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1929800","reference_id":"1929800","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:49:41Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1929800"},{"reference_url":"https://security.gentoo.org/glsa/202309-06","reference_id":"GLSA-202309-06","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:49:41Z/"}],"url":"https://security.gentoo.org/glsa/202309-06"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230331-0005/","reference_id":"ntap-20230331-0005","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:49:41Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230331-0005/"},{"reference_url":"https://bugzilla.samba.org/show_bug.cgi?id=14611","reference_id":"show_bug.cgi?id=14611","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:49:41Z/"}],"url":"https://bugzilla.samba.org/show_bug.cgi?id=14611"},{"reference_url":"https://usn.ubuntu.com/5822-1/","reference_id":"USN-5822-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5822-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994568?format=json","purl":"pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u2"}],"aliases":["CVE-2021-20251"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fskg-j9fe-6yeg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48506?format=json","vulnerability_id":"VCID-hfsk-4cbd-m3b1","summary":"Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0614.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0614.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0614","reference_id":"","reference_type":"","scores":[{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40636","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40714","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40687","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40696","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40713","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40678","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40659","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40704","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40674","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44492","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44409","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44413","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44332","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00246","scoring_system":"epss","scoring_elements":"0.47868","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0614"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0614","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0614"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2182776","reference_id":"2182776","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2182776"},{"reference_url":"https://www.samba.org/samba/security/CVE-2023-0614.html","reference_id":"CVE-2023-0614.html","reference_type":"","scores":[{"value":"7.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T14:52:15Z/"}],"url":"https://www.samba.org/samba/security/CVE-2023-0614.html"},{"reference_url":"https://security.gentoo.org/glsa/202309-06","reference_id":"GLSA-202309-06","reference_type":"","scores":[{"value":"7.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T14:52:15Z/"}],"url":"https://security.gentoo.org/glsa/202309-06"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230406-0007/","reference_id":"ntap-20230406-0007","reference_type":"","scores":[{"value":"7.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T14:52:15Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230406-0007/"},{"reference_url":"https://usn.ubuntu.com/5992-1/","reference_id":"USN-5992-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5992-1/"},{"reference_url":"https://usn.ubuntu.com/5993-1/","reference_id":"USN-5993-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5993-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YXBPYIA4VWNOD437NAHZ3NXKAETLFB5S/","reference_id":"YXBPYIA4VWNOD437NAHZ3NXKAETLFB5S","reference_type":"","scores":[{"value":"7.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T14:52:15Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YXBPYIA4VWNOD437NAHZ3NXKAETLFB5S/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994568?format=json","purl":"pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u2"}],"aliases":["CVE-2023-0614"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"6.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hfsk-4cbd-m3b1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79340?format=json","vulnerability_id":"VCID-kkwp-2x9m-9bgd","summary":"samba: check attribute access rights for LDAP adds of computers","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25720.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25720.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25720","reference_id":"","reference_type":"","scores":[{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42702","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51397","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51424","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51383","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51347","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52544","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52534","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52591","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52598","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52583","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59542","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59546","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59559","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59577","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59561","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25720"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2305954","reference_id":"2305954","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-17T16:18:39Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2305954"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4","reference_id":"cpe:/a:redhat:openshift:4","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:storage:3","reference_id":"cpe:/a:redhat:storage:3","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:storage:3"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10","reference_id":"cpe:/o:redhat:enterprise_linux:10","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9","reference_id":"cpe:/o:redhat:enterprise_linux:9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2020-25720","reference_id":"CVE-2020-25720","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-17T16:18:39Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2020-25720"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994568?format=json","purl":"pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u2"}],"aliases":["CVE-2020-25720"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kkwp-2x9m-9bgd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46966?format=json","vulnerability_id":"VCID-q2d9-vahb-6qce","summary":"Multiple vulnerabilities have been discovered in Samba, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4154.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4154.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4154","reference_id":"","reference_type":"","scores":[{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54512","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54535","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54504","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54556","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.5455","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54562","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54544","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54523","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00397","scoring_system":"epss","scoring_elements":"0.60557","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00397","scoring_system":"epss","scoring_elements":"0.60575","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00397","scoring_system":"epss","scoring_elements":"0.60582","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00397","scoring_system":"epss","scoring_elements":"0.60569","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00397","scoring_system":"epss","scoring_elements":"0.60555","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00397","scoring_system":"epss","scoring_elements":"0.60568","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4154"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4154","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4154"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2241883","reference_id":"2241883","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2241883"},{"reference_url":"https://security.gentoo.org/glsa/202402-28","reference_id":"GLSA-202402-28","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-28"},{"reference_url":"https://usn.ubuntu.com/6425-1/","reference_id":"USN-6425-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6425-1/"},{"reference_url":"https://usn.ubuntu.com/6425-3/","reference_id":"USN-6425-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6425-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994568?format=json","purl":"pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u2"}],"aliases":["CVE-2023-4154"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q2d9-vahb-6qce"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46970?format=json","vulnerability_id":"VCID-r7va-6j6s-rba5","summary":"Multiple vulnerabilities have been discovered in Samba, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42669.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42669.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42669","reference_id":"","reference_type":"","scores":[{"value":"0.00578","scoring_system":"epss","scoring_elements":"0.68927","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00578","scoring_system":"epss","scoring_elements":"0.68789","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00578","scoring_system":"epss","scoring_elements":"0.6888","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00578","scoring_system":"epss","scoring_elements":"0.68866","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00578","scoring_system":"epss","scoring_elements":"0.68837","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00578","scoring_system":"epss","scoring_elements":"0.68878","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00578","scoring_system":"epss","scoring_elements":"0.68889","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00578","scoring_system":"epss","scoring_elements":"0.68915","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00578","scoring_system":"epss","scoring_elements":"0.68921","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00578","scoring_system":"epss","scoring_elements":"0.6881","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00578","scoring_system":"epss","scoring_elements":"0.68788","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00578","scoring_system":"epss","scoring_elements":"0.68839","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00578","scoring_system":"epss","scoring_elements":"0.68858","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42669"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42669","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42669"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2241884","reference_id":"2241884","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-30T14:56:59Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2241884"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::resilientstorage","reference_id":"cpe:/a:redhat:enterprise_linux:9::resilientstorage","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::resilientstorage"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb","reference_id":"cpe:/a:redhat:rhel_eus:8.6::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb","reference_id":"cpe:/a:redhat:rhel_eus:8.8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb","reference_id":"cpe:/a:redhat:rhel_eus:9.0::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::resilientstorage","reference_id":"cpe:/a:redhat:rhel_eus:9.0::resilientstorage","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::resilientstorage"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb","reference_id":"cpe:/a:redhat:rhel_eus:9.2::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::resilientstorage","reference_id":"cpe:/a:redhat:rhel_eus:9.2::resilientstorage","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::resilientstorage"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:storage:3","reference_id":"cpe:/a:redhat:storage:3","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:storage:3"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos","reference_id":"cpe:/o:redhat:enterprise_linux:8::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos","reference_id":"cpe:/o:redhat:enterprise_linux:9::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos","reference_id":"cpe:/o:redhat:rhel_eus:8.6::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos","reference_id":"cpe:/o:redhat:rhel_eus:8.8::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.0::baseos","reference_id":"cpe:/o:redhat:rhel_eus:9.0::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.0::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos","reference_id":"cpe:/o:redhat:rhel_eus:9.2::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8","reference_id":"cpe:/o:redhat:rhev_hypervisor:4.4::el8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-42669","reference_id":"CVE-2023-42669","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-30T14:56:59Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2023-42669"},{"reference_url":"https://www.samba.org/samba/security/CVE-2023-42669.html","reference_id":"CVE-2023-42669.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-30T14:56:59Z/"}],"url":"https://www.samba.org/samba/security/CVE-2023-42669.html"},{"reference_url":"https://security.gentoo.org/glsa/202402-28","reference_id":"GLSA-202402-28","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-28"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6209","reference_id":"RHSA-2023:6209","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-30T14:56:59Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:6209"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6744","reference_id":"RHSA-2023:6744","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-30T14:56:59Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:6744"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7371","reference_id":"RHSA-2023:7371","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-30T14:56:59Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7371"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7408","reference_id":"RHSA-2023:7408","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-30T14:56:59Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7408"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7464","reference_id":"RHSA-2023:7464","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-30T14:56:59Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7464"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7467","reference_id":"RHSA-2023:7467","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-30T14:56:59Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7467"},{"reference_url":"https://bugzilla.samba.org/show_bug.cgi?id=15474","reference_id":"show_bug.cgi?id=15474","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-30T14:56:59Z/"}],"url":"https://bugzilla.samba.org/show_bug.cgi?id=15474"},{"reference_url":"https://usn.ubuntu.com/6425-1/","reference_id":"USN-6425-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6425-1/"},{"reference_url":"https://usn.ubuntu.com/6425-3/","reference_id":"USN-6425-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6425-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994568?format=json","purl":"pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u2"}],"aliases":["CVE-2023-42669"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r7va-6j6s-rba5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48479?format=json","vulnerability_id":"VCID-w4c6-p858-rkaw","summary":"Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3670.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3670.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3670","reference_id":"","reference_type":"","scores":[{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.86885","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.86903","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.86874","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03426","scoring_system":"epss","scoring_elements":"0.87472","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03426","scoring_system":"epss","scoring_elements":"0.87467","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03426","scoring_system":"epss","scoring_elements":"0.87464","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03426","scoring_system":"epss","scoring_elements":"0.87478","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03426","scoring_system":"epss","scoring_elements":"0.8748","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03426","scoring_system":"epss","scoring_elements":"0.87494","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03426","scoring_system":"epss","scoring_elements":"0.87501","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03426","scoring_system":"epss","scoring_elements":"0.87435","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03426","scoring_system":"epss","scoring_elements":"0.87453","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03426","scoring_system":"epss","scoring_elements":"0.8746","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3670"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3670","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3670"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2077533","reference_id":"2077533","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2077533"},{"reference_url":"https://security.gentoo.org/glsa/202309-06","reference_id":"GLSA-202309-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202309-06"},{"reference_url":"https://usn.ubuntu.com/5542-1/","reference_id":"USN-5542-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5542-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994568?format=json","purl":"pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u2"}],"aliases":["CVE-2021-3670"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w4c6-p858-rkaw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48482?format=json","vulnerability_id":"VCID-wxva-f9ay-c3a2","summary":"Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20316.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20316.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-20316","reference_id":"","reference_type":"","scores":[{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72249","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72255","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72274","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.7225","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72289","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72301","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72323","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72307","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72294","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72336","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72345","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72333","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72376","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72386","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72382","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-20316"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20316","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20316"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004690","reference_id":"1004690","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004690"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2009673","reference_id":"2009673","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2009673"},{"reference_url":"https://security.gentoo.org/glsa/202309-06","reference_id":"GLSA-202309-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202309-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1756","reference_id":"RHSA-2022:1756","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1756"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:2074","reference_id":"RHSA-2022:2074","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:2074"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994568?format=json","purl":"pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u2"}],"aliases":["CVE-2021-20316"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wxva-f9ay-c3a2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48500?format=json","vulnerability_id":"VCID-xmn1-g72k-8qcq","summary":"Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-37966.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-37966.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-37966","reference_id":"","reference_type":"","scores":[{"value":"0.01378","scoring_system":"epss","scoring_elements":"0.80345","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01378","scoring_system":"epss","scoring_elements":"0.80291","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01378","scoring_system":"epss","scoring_elements":"0.80295","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01378","scoring_system":"epss","scoring_elements":"0.80321","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01378","scoring_system":"epss","scoring_elements":"0.80327","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01378","scoring_system":"epss","scoring_elements":"0.80215","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01378","scoring_system":"epss","scoring_elements":"0.80235","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01378","scoring_system":"epss","scoring_elements":"0.80224","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01378","scoring_system":"epss","scoring_elements":"0.80252","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01378","scoring_system":"epss","scoring_elements":"0.80262","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01378","scoring_system":"epss","scoring_elements":"0.8028","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01378","scoring_system":"epss","scoring_elements":"0.80265","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01378","scoring_system":"epss","scoring_elements":"0.80259","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01378","scoring_system":"epss","scoring_elements":"0.80289","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-37966"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37966","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37966"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2154303","reference_id":"2154303","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2154303"},{"reference_url":"https://security.archlinux.org/AVG-2828","reference_id":"AVG-2828","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2828"},{"reference_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37966","reference_id":"CVE-2022-37966","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T13:50:56Z/"}],"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37966"},{"reference_url":"https://security.gentoo.org/glsa/202309-06","reference_id":"GLSA-202309-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202309-06"},{"reference_url":"https://usn.ubuntu.com/5822-1/","reference_id":"USN-5822-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5822-1/"},{"reference_url":"https://usn.ubuntu.com/5936-1/","reference_id":"USN-5936-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5936-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994568?format=json","purl":"pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.17.12%252Bdfsg-0%252Bdeb12u2"}],"aliases":["CVE-2022-37966"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xmn1-g72k-8qcq"}],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/44838?format=json","vulnerability_id":"VCID-2dm7-xt4e-wkex","summary":"Multiple vulnerabilities have been found in Samba, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14303.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14303.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14303","reference_id":"","reference_type":"","scores":[{"value":"0.26364","scoring_system":"epss","scoring_elements":"0.96273","published_at":"2026-04-01T12:55:00Z"},{"value":"0.26364","scoring_system":"epss","scoring_elements":"0.9633","published_at":"2026-04-29T12:55:00Z"},{"value":"0.26364","scoring_system":"epss","scoring_elements":"0.96327","published_at":"2026-04-24T12:55:00Z"},{"value":"0.26364","scoring_system":"epss","scoring_elements":"0.96329","published_at":"2026-04-26T12:55:00Z"},{"value":"0.26364","scoring_system":"epss","scoring_elements":"0.96281","published_at":"2026-04-02T12:55:00Z"},{"value":"0.26364","scoring_system":"epss","scoring_elements":"0.96289","published_at":"2026-04-04T12:55:00Z"},{"value":"0.26364","scoring_system":"epss","scoring_elements":"0.96293","published_at":"2026-04-07T12:55:00Z"},{"value":"0.26364","scoring_system":"epss","scoring_elements":"0.96302","published_at":"2026-04-08T12:55:00Z"},{"value":"0.26364","scoring_system":"epss","scoring_elements":"0.96305","published_at":"2026-04-09T12:55:00Z"},{"value":"0.26364","scoring_system":"epss","scoring_elements":"0.96309","published_at":"2026-04-12T12:55:00Z"},{"value":"0.26364","scoring_system":"epss","scoring_elements":"0.96312","published_at":"2026-04-13T12:55:00Z"},{"value":"0.26364","scoring_system":"epss","scoring_elements":"0.96321","published_at":"2026-04-16T12:55:00Z"},{"value":"0.26364","scoring_system":"epss","scoring_elements":"0.96325","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14303"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1851298","reference_id":"1851298","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1851298"},{"reference_url":"https://security.archlinux.org/AVG-1202","reference_id":"AVG-1202","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1202"},{"reference_url":"https://security.gentoo.org/glsa/202007-15","reference_id":"GLSA-202007-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-15"},{"reference_url":"https://usn.ubuntu.com/4454-1/","reference_id":"USN-4454-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4454-1/"},{"reference_url":"https://usn.ubuntu.com/4454-2/","reference_id":"USN-4454-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4454-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994567?format=json","purl":"pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-18xs-py1v-xfey"},{"vulnerability":"VCID-28rq-1d68-4bfz"},{"vulnerability":"VCID-2w26-yjmn-k7an"},{"vulnerability":"VCID-3du2-evy8-jfa1"},{"vulnerability":"VCID-5cd3-497h-qkhw"},{"vulnerability":"VCID-68zz-z589-87f6"},{"vulnerability":"VCID-6mju-nwzy-pqeq"},{"vulnerability":"VCID-745n-wca7-d7fh"},{"vulnerability":"VCID-7xdg-sn88-bkbs"},{"vulnerability":"VCID-84q8-2457-qkc5"},{"vulnerability":"VCID-94k8-98me-x3dw"},{"vulnerability":"VCID-apqw-e2px-yka5"},{"vulnerability":"VCID-b4ty-d775-5fed"},{"vulnerability":"VCID-bc1t-hzu5-bffd"},{"vulnerability":"VCID-bpht-9daq-rfgd"},{"vulnerability":"VCID-fskg-j9fe-6yeg"},{"vulnerability":"VCID-hfsk-4cbd-m3b1"},{"vulnerability":"VCID-kkwp-2x9m-9bgd"},{"vulnerability":"VCID-q2d9-vahb-6qce"},{"vulnerability":"VCID-r7va-6j6s-rba5"},{"vulnerability":"VCID-w4c6-p858-rkaw"},{"vulnerability":"VCID-wxva-f9ay-c3a2"},{"vulnerability":"VCID-xmn1-g72k-8qcq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"}],"aliases":["CVE-2020-14303"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2dm7-xt4e-wkex"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47963?format=json","vulnerability_id":"VCID-2gkd-vubu-j7fd","summary":"Multiple vulnerabilities have been found in Samba, the worst of\n    which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14861.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14861.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-14861","reference_id":"","reference_type":"","scores":[{"value":"0.04997","scoring_system":"epss","scoring_elements":"0.89733","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04997","scoring_system":"epss","scoring_elements":"0.89663","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04997","scoring_system":"epss","scoring_elements":"0.89666","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04997","scoring_system":"epss","scoring_elements":"0.8968","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04997","scoring_system":"epss","scoring_elements":"0.89683","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04997","scoring_system":"epss","scoring_elements":"0.897","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04997","scoring_system":"epss","scoring_elements":"0.89706","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04997","scoring_system":"epss","scoring_elements":"0.89713","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04997","scoring_system":"epss","scoring_elements":"0.89712","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04997","scoring_system":"epss","scoring_elements":"0.89705","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04997","scoring_system":"epss","scoring_elements":"0.89721","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04997","scoring_system":"epss","scoring_elements":"0.89722","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04997","scoring_system":"epss","scoring_elements":"0.89717","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04997","scoring_system":"epss","scoring_elements":"0.89732","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04997","scoring_system":"epss","scoring_elements":"0.89734","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-14861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14861"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1778586","reference_id":"1778586","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1778586"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/06/24/3","reference_id":"3","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/06/24/3"},{"reference_url":"https://www.samba.org/samba/security/CVE-2019-14861.html","reference_id":"CVE-2019-14861.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/"}],"url":"https://www.samba.org/samba/security/CVE-2019-14861.html"},{"reference_url":"https://security.gentoo.org/glsa/202003-52","reference_id":"GLSA-202003-52","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/"}],"url":"https://security.gentoo.org/glsa/202003-52"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00038.html","reference_id":"msg00038.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00038.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20191210-0002/","reference_id":"ntap-20191210-0002","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/"}],"url":"https://security.netapp.com/advisory/ntap-20191210-0002/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PJH3ROOFYMOATD2UEPC47P5RPBDTY77E/","reference_id":"PJH3ROOFYMOATD2UEPC47P5RPBDTY77E","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PJH3ROOFYMOATD2UEPC47P5RPBDTY77E/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14861","reference_id":"show_bug.cgi?id=CVE-2019-14861","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14861"},{"reference_url":"https://www.synology.com/security/advisory/Synology_SA_19_40","reference_id":"Synology_SA_19_40","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/"}],"url":"https://www.synology.com/security/advisory/Synology_SA_19_40"},{"reference_url":"https://usn.ubuntu.com/4217-1/","reference_id":"USN-4217-1","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/"}],"url":"https://usn.ubuntu.com/4217-1/"},{"reference_url":"https://usn.ubuntu.com/4217-2/","reference_id":"USN-4217-2","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/"}],"url":"https://usn.ubuntu.com/4217-2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNKA4YIPV7AZR7KK3GW6L3HKGHSGJZFE/","reference_id":"WNKA4YIPV7AZR7KK3GW6L3HKGHSGJZFE","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T15:36:30Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNKA4YIPV7AZR7KK3GW6L3HKGHSGJZFE/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994567?format=json","purl":"pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-18xs-py1v-xfey"},{"vulnerability":"VCID-28rq-1d68-4bfz"},{"vulnerability":"VCID-2w26-yjmn-k7an"},{"vulnerability":"VCID-3du2-evy8-jfa1"},{"vulnerability":"VCID-5cd3-497h-qkhw"},{"vulnerability":"VCID-68zz-z589-87f6"},{"vulnerability":"VCID-6mju-nwzy-pqeq"},{"vulnerability":"VCID-745n-wca7-d7fh"},{"vulnerability":"VCID-7xdg-sn88-bkbs"},{"vulnerability":"VCID-84q8-2457-qkc5"},{"vulnerability":"VCID-94k8-98me-x3dw"},{"vulnerability":"VCID-apqw-e2px-yka5"},{"vulnerability":"VCID-b4ty-d775-5fed"},{"vulnerability":"VCID-bc1t-hzu5-bffd"},{"vulnerability":"VCID-bpht-9daq-rfgd"},{"vulnerability":"VCID-fskg-j9fe-6yeg"},{"vulnerability":"VCID-hfsk-4cbd-m3b1"},{"vulnerability":"VCID-kkwp-2x9m-9bgd"},{"vulnerability":"VCID-q2d9-vahb-6qce"},{"vulnerability":"VCID-r7va-6j6s-rba5"},{"vulnerability":"VCID-w4c6-p858-rkaw"},{"vulnerability":"VCID-wxva-f9ay-c3a2"},{"vulnerability":"VCID-xmn1-g72k-8qcq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"}],"aliases":["CVE-2019-14861"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2gkd-vubu-j7fd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48483?format=json","vulnerability_id":"VCID-47k4-8k1s-zff2","summary":"Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23192.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23192.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-23192","reference_id":"","reference_type":"","scores":[{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28302","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28652","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28604","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.2849","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28378","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.31176","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.31052","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.31081","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.31088","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.31044","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30999","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.3103","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.31002","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.31128","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30996","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-23192"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2019666","reference_id":"2019666","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2019666"},{"reference_url":"https://security.archlinux.org/AVG-2538","reference_id":"AVG-2538","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2538"},{"reference_url":"https://security.gentoo.org/glsa/202309-06","reference_id":"GLSA-202309-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202309-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4843","reference_id":"RHSA-2021:4843","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4843"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:5082","reference_id":"RHSA-2021:5082","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:5082"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0008","reference_id":"RHSA-2022:0008","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0008"},{"reference_url":"https://usn.ubuntu.com/5142-1/","reference_id":"USN-5142-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5142-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994567?format=json","purl":"pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-18xs-py1v-xfey"},{"vulnerability":"VCID-28rq-1d68-4bfz"},{"vulnerability":"VCID-2w26-yjmn-k7an"},{"vulnerability":"VCID-3du2-evy8-jfa1"},{"vulnerability":"VCID-5cd3-497h-qkhw"},{"vulnerability":"VCID-68zz-z589-87f6"},{"vulnerability":"VCID-6mju-nwzy-pqeq"},{"vulnerability":"VCID-745n-wca7-d7fh"},{"vulnerability":"VCID-7xdg-sn88-bkbs"},{"vulnerability":"VCID-84q8-2457-qkc5"},{"vulnerability":"VCID-94k8-98me-x3dw"},{"vulnerability":"VCID-apqw-e2px-yka5"},{"vulnerability":"VCID-b4ty-d775-5fed"},{"vulnerability":"VCID-bc1t-hzu5-bffd"},{"vulnerability":"VCID-bpht-9daq-rfgd"},{"vulnerability":"VCID-fskg-j9fe-6yeg"},{"vulnerability":"VCID-hfsk-4cbd-m3b1"},{"vulnerability":"VCID-kkwp-2x9m-9bgd"},{"vulnerability":"VCID-q2d9-vahb-6qce"},{"vulnerability":"VCID-r7va-6j6s-rba5"},{"vulnerability":"VCID-w4c6-p858-rkaw"},{"vulnerability":"VCID-wxva-f9ay-c3a2"},{"vulnerability":"VCID-xmn1-g72k-8qcq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"}],"aliases":["CVE-2021-23192"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-47k4-8k1s-zff2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81895?format=json","vulnerability_id":"VCID-4qm6-a9un-nyda","summary":"samba: samba AD DC LDAP denial of service via dirsync","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14847.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14847.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-14847","reference_id":"","reference_type":"","scores":[{"value":"0.02434","scoring_system":"epss","scoring_elements":"0.8509","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02434","scoring_system":"epss","scoring_elements":"0.85212","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02434","scoring_system":"epss","scoring_elements":"0.85161","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02434","scoring_system":"epss","scoring_elements":"0.85182","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02434","scoring_system":"epss","scoring_elements":"0.85183","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02434","scoring_system":"epss","scoring_elements":"0.85205","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02434","scoring_system":"epss","scoring_elements":"0.85214","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02434","scoring_system":"epss","scoring_elements":"0.85103","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02434","scoring_system":"epss","scoring_elements":"0.8512","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02434","scoring_system":"epss","scoring_elements":"0.85124","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02434","scoring_system":"epss","scoring_elements":"0.85145","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02434","scoring_system":"epss","scoring_elements":"0.85152","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02434","scoring_system":"epss","scoring_elements":"0.85167","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02434","scoring_system":"epss","scoring_elements":"0.85164","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-14847"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14847","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14847"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14847","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14847"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKPYHDFI7HRELVXBE5J4MTGSI35AKFBI/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKPYHDFI7HRELVXBE5J4MTGSI35AKFBI/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3IUACPZJXSC4OM6P2V4IC4QMZQZWPD/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3IUACPZJXSC4OM6P2V4IC4QMZQZWPD/"},{"reference_url":"https://www.samba.org/samba/security/CVE-2019-14847.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.samba.org/samba/security/CVE-2019-14847.html"},{"reference_url":"https://www.synology.com/security/advisory/Synology_SA_19_35","reference_id":"","reference_type":"","scores":[],"url":"https://www.synology.com/security/advisory/Synology_SA_19_35"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1764142","reference_id":"1764142","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1764142"},{"reference_url":"https://security.archlinux.org/ASA-201911-6","reference_id":"ASA-201911-6","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201911-6"},{"reference_url":"https://security.archlinux.org/AVG-1057","reference_id":"AVG-1057","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1057"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-14847","reference_id":"CVE-2019-14847","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:P"},{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-14847"},{"reference_url":"https://usn.ubuntu.com/4167-1/","reference_id":"USN-4167-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4167-1/"},{"reference_url":"https://usn.ubuntu.com/4167-2/","reference_id":"USN-4167-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4167-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994567?format=json","purl":"pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-18xs-py1v-xfey"},{"vulnerability":"VCID-28rq-1d68-4bfz"},{"vulnerability":"VCID-2w26-yjmn-k7an"},{"vulnerability":"VCID-3du2-evy8-jfa1"},{"vulnerability":"VCID-5cd3-497h-qkhw"},{"vulnerability":"VCID-68zz-z589-87f6"},{"vulnerability":"VCID-6mju-nwzy-pqeq"},{"vulnerability":"VCID-745n-wca7-d7fh"},{"vulnerability":"VCID-7xdg-sn88-bkbs"},{"vulnerability":"VCID-84q8-2457-qkc5"},{"vulnerability":"VCID-94k8-98me-x3dw"},{"vulnerability":"VCID-apqw-e2px-yka5"},{"vulnerability":"VCID-b4ty-d775-5fed"},{"vulnerability":"VCID-bc1t-hzu5-bffd"},{"vulnerability":"VCID-bpht-9daq-rfgd"},{"vulnerability":"VCID-fskg-j9fe-6yeg"},{"vulnerability":"VCID-hfsk-4cbd-m3b1"},{"vulnerability":"VCID-kkwp-2x9m-9bgd"},{"vulnerability":"VCID-q2d9-vahb-6qce"},{"vulnerability":"VCID-r7va-6j6s-rba5"},{"vulnerability":"VCID-w4c6-p858-rkaw"},{"vulnerability":"VCID-wxva-f9ay-c3a2"},{"vulnerability":"VCID-xmn1-g72k-8qcq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"}],"aliases":["CVE-2019-14847"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4qm6-a9un-nyda"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47966?format=json","vulnerability_id":"VCID-55zj-6b4s-8ker","summary":"Multiple vulnerabilities have been found in Samba, the worst of\n    which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14902.json","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14902.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-14902","reference_id":"","reference_type":"","scores":[{"value":"0.03503","scoring_system":"epss","scoring_elements":"0.87558","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03503","scoring_system":"epss","scoring_elements":"0.87567","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03503","scoring_system":"epss","scoring_elements":"0.87581","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03503","scoring_system":"epss","scoring_elements":"0.87583","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03503","scoring_system":"epss","scoring_elements":"0.87602","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03503","scoring_system":"epss","scoring_elements":"0.87609","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03503","scoring_system":"epss","scoring_elements":"0.8762","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03503","scoring_system":"epss","scoring_elements":"0.87615","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03503","scoring_system":"epss","scoring_elements":"0.87612","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03503","scoring_system":"epss","scoring_elements":"0.87627","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03503","scoring_system":"epss","scoring_elements":"0.87628","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03503","scoring_system":"epss","scoring_elements":"0.87625","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03503","scoring_system":"epss","scoring_elements":"0.87643","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03503","scoring_system":"epss","scoring_elements":"0.8765","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03503","scoring_system":"epss","scoring_elements":"0.87648","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-14902"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14902","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14902"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1791201","reference_id":"1791201","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1791201"},{"reference_url":"https://security.gentoo.org/glsa/202003-52","reference_id":"GLSA-202003-52","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-52"},{"reference_url":"https://usn.ubuntu.com/4244-1/","reference_id":"USN-4244-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4244-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994567?format=json","purl":"pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-18xs-py1v-xfey"},{"vulnerability":"VCID-28rq-1d68-4bfz"},{"vulnerability":"VCID-2w26-yjmn-k7an"},{"vulnerability":"VCID-3du2-evy8-jfa1"},{"vulnerability":"VCID-5cd3-497h-qkhw"},{"vulnerability":"VCID-68zz-z589-87f6"},{"vulnerability":"VCID-6mju-nwzy-pqeq"},{"vulnerability":"VCID-745n-wca7-d7fh"},{"vulnerability":"VCID-7xdg-sn88-bkbs"},{"vulnerability":"VCID-84q8-2457-qkc5"},{"vulnerability":"VCID-94k8-98me-x3dw"},{"vulnerability":"VCID-apqw-e2px-yka5"},{"vulnerability":"VCID-b4ty-d775-5fed"},{"vulnerability":"VCID-bc1t-hzu5-bffd"},{"vulnerability":"VCID-bpht-9daq-rfgd"},{"vulnerability":"VCID-fskg-j9fe-6yeg"},{"vulnerability":"VCID-hfsk-4cbd-m3b1"},{"vulnerability":"VCID-kkwp-2x9m-9bgd"},{"vulnerability":"VCID-q2d9-vahb-6qce"},{"vulnerability":"VCID-r7va-6j6s-rba5"},{"vulnerability":"VCID-w4c6-p858-rkaw"},{"vulnerability":"VCID-wxva-f9ay-c3a2"},{"vulnerability":"VCID-xmn1-g72k-8qcq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"}],"aliases":["CVE-2019-14902"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"4.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-55zj-6b4s-8ker"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48475?format=json","vulnerability_id":"VCID-5vyg-1jzr-ebh8","summary":"Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25718.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25718.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25718","reference_id":"","reference_type":"","scores":[{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.4183","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41592","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.4167","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41671","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41895","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41923","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41755","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41805","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41815","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41838","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41806","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41793","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41842","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41743","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25718"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2019726","reference_id":"2019726","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2019726"},{"reference_url":"https://security.archlinux.org/AVG-2538","reference_id":"AVG-2538","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2538"},{"reference_url":"https://security.gentoo.org/glsa/202309-06","reference_id":"GLSA-202309-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202309-06"},{"reference_url":"https://usn.ubuntu.com/5142-1/","reference_id":"USN-5142-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5142-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994567?format=json","purl":"pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-18xs-py1v-xfey"},{"vulnerability":"VCID-28rq-1d68-4bfz"},{"vulnerability":"VCID-2w26-yjmn-k7an"},{"vulnerability":"VCID-3du2-evy8-jfa1"},{"vulnerability":"VCID-5cd3-497h-qkhw"},{"vulnerability":"VCID-68zz-z589-87f6"},{"vulnerability":"VCID-6mju-nwzy-pqeq"},{"vulnerability":"VCID-745n-wca7-d7fh"},{"vulnerability":"VCID-7xdg-sn88-bkbs"},{"vulnerability":"VCID-84q8-2457-qkc5"},{"vulnerability":"VCID-94k8-98me-x3dw"},{"vulnerability":"VCID-apqw-e2px-yka5"},{"vulnerability":"VCID-b4ty-d775-5fed"},{"vulnerability":"VCID-bc1t-hzu5-bffd"},{"vulnerability":"VCID-bpht-9daq-rfgd"},{"vulnerability":"VCID-fskg-j9fe-6yeg"},{"vulnerability":"VCID-hfsk-4cbd-m3b1"},{"vulnerability":"VCID-kkwp-2x9m-9bgd"},{"vulnerability":"VCID-q2d9-vahb-6qce"},{"vulnerability":"VCID-r7va-6j6s-rba5"},{"vulnerability":"VCID-w4c6-p858-rkaw"},{"vulnerability":"VCID-wxva-f9ay-c3a2"},{"vulnerability":"VCID-xmn1-g72k-8qcq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"}],"aliases":["CVE-2020-25718"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5vyg-1jzr-ebh8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47171?format=json","vulnerability_id":"VCID-76sz-d2yt-buek","summary":"Multiple vulnerabilities have been found in Samba, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14383.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14383.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14383","reference_id":"","reference_type":"","scores":[{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64258","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64316","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64408","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64336","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64372","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64383","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64375","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64395","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64344","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64301","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64349","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64364","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64377","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64365","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14383"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14383","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14383"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1892636","reference_id":"1892636","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T15:10:17Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1892636"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973398","reference_id":"973398","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973398"},{"reference_url":"https://www.samba.org/samba/security/CVE-2020-14383.html","reference_id":"CVE-2020-14383.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T15:10:17Z/"}],"url":"https://www.samba.org/samba/security/CVE-2020-14383.html"},{"reference_url":"https://security.gentoo.org/glsa/202012-24","reference_id":"GLSA-202012-24","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T15:10:17Z/"}],"url":"https://security.gentoo.org/glsa/202012-24"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html","reference_id":"msg00015.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T15:10:17Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html"},{"reference_url":"https://usn.ubuntu.com/4611-1/","reference_id":"USN-4611-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4611-1/"},{"reference_url":"https://usn.ubuntu.com/4931-1/","reference_id":"USN-4931-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4931-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994567?format=json","purl":"pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-18xs-py1v-xfey"},{"vulnerability":"VCID-28rq-1d68-4bfz"},{"vulnerability":"VCID-2w26-yjmn-k7an"},{"vulnerability":"VCID-3du2-evy8-jfa1"},{"vulnerability":"VCID-5cd3-497h-qkhw"},{"vulnerability":"VCID-68zz-z589-87f6"},{"vulnerability":"VCID-6mju-nwzy-pqeq"},{"vulnerability":"VCID-745n-wca7-d7fh"},{"vulnerability":"VCID-7xdg-sn88-bkbs"},{"vulnerability":"VCID-84q8-2457-qkc5"},{"vulnerability":"VCID-94k8-98me-x3dw"},{"vulnerability":"VCID-apqw-e2px-yka5"},{"vulnerability":"VCID-b4ty-d775-5fed"},{"vulnerability":"VCID-bc1t-hzu5-bffd"},{"vulnerability":"VCID-bpht-9daq-rfgd"},{"vulnerability":"VCID-fskg-j9fe-6yeg"},{"vulnerability":"VCID-hfsk-4cbd-m3b1"},{"vulnerability":"VCID-kkwp-2x9m-9bgd"},{"vulnerability":"VCID-q2d9-vahb-6qce"},{"vulnerability":"VCID-r7va-6j6s-rba5"},{"vulnerability":"VCID-w4c6-p858-rkaw"},{"vulnerability":"VCID-wxva-f9ay-c3a2"},{"vulnerability":"VCID-xmn1-g72k-8qcq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"}],"aliases":["CVE-2020-14383"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-76sz-d2yt-buek"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48485?format=json","vulnerability_id":"VCID-7bb1-3ny6-rbbv","summary":"Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44142.json","reference_id":"","reference_type":"","scores":[{"value":"9.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44142.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-44142","reference_id":"","reference_type":"","scores":[{"value":"0.30651","scoring_system":"epss","scoring_elements":"0.96699","published_at":"2026-04-04T12:55:00Z"},{"value":"0.30651","scoring_system":"epss","scoring_elements":"0.96687","published_at":"2026-04-01T12:55:00Z"},{"value":"0.30651","scoring_system":"epss","scoring_elements":"0.96697","published_at":"2026-04-02T12:55:00Z"},{"value":"0.32269","scoring_system":"epss","scoring_elements":"0.96831","published_at":"2026-04-08T12:55:00Z"},{"value":"0.32269","scoring_system":"epss","scoring_elements":"0.96823","published_at":"2026-04-07T12:55:00Z"},{"value":"0.37405","scoring_system":"epss","scoring_elements":"0.97198","published_at":"2026-04-29T12:55:00Z"},{"value":"0.37405","scoring_system":"epss","scoring_elements":"0.97175","published_at":"2026-04-09T12:55:00Z"},{"value":"0.37405","scoring_system":"epss","scoring_elements":"0.97179","published_at":"2026-04-11T12:55:00Z"},{"value":"0.37405","scoring_system":"epss","scoring_elements":"0.9718","published_at":"2026-04-12T12:55:00Z"},{"value":"0.37405","scoring_system":"epss","scoring_elements":"0.97181","published_at":"2026-04-13T12:55:00Z"},{"value":"0.37405","scoring_system":"epss","scoring_elements":"0.97188","published_at":"2026-04-16T12:55:00Z"},{"value":"0.37405","scoring_system":"epss","scoring_elements":"0.97191","published_at":"2026-04-18T12:55:00Z"},{"value":"0.37405","scoring_system":"epss","scoring_elements":"0.97195","published_at":"2026-04-24T12:55:00Z"},{"value":"0.37405","scoring_system":"epss","scoring_elements":"0.97197","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-44142"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44142","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44142"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"9.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004693","reference_id":"1004693","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004693"},{"reference_url":"https://kb.cert.org/vuls/id/119678","reference_id":"119678","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:30:59Z/"}],"url":"https://kb.cert.org/vuls/id/119678"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2046146","reference_id":"2046146","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2046146"},{"reference_url":"https://security.archlinux.org/AVG-2648","reference_id":"AVG-2648","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2648"},{"reference_url":"https://www.zerodayinitiative.com/blog/2022/2/1/cve-2021-44142-details-on-a-samba-code-execution-bug-demonstrated-at-pwn2own-austin","reference_id":"cve-2021-44142-details-on-a-samba-code-execution-bug-demonstrated-at-pwn2own-austin","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:30:59Z/"}],"url":"https://www.zerodayinitiative.com/blog/2022/2/1/cve-2021-44142-details-on-a-samba-code-execution-bug-demonstrated-at-pwn2own-austin"},{"reference_url":"https://www.samba.org/samba/security/CVE-2021-44142.html","reference_id":"CVE-2021-44142.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:30:59Z/"}],"url":"https://www.samba.org/samba/security/CVE-2021-44142.html"},{"reference_url":"https://security.gentoo.org/glsa/202309-06","reference_id":"GLSA-202309-06","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:30:59Z/"}],"url":"https://security.gentoo.org/glsa/202309-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0328","reference_id":"RHSA-2022:0328","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0328"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0329","reference_id":"RHSA-2022:0329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0330","reference_id":"RHSA-2022:0330","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0330"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0331","reference_id":"RHSA-2022:0331","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0331"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0332","reference_id":"RHSA-2022:0332","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0332"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0457","reference_id":"RHSA-2022:0457","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0457"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0458","reference_id":"RHSA-2022:0458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0663","reference_id":"RHSA-2022:0663","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0663"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0664","reference_id":"RHSA-2022:0664","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0664"},{"reference_url":"https://bugzilla.samba.org/show_bug.cgi?id=14914","reference_id":"show_bug.cgi?id=14914","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:30:59Z/"}],"url":"https://bugzilla.samba.org/show_bug.cgi?id=14914"},{"reference_url":"https://usn.ubuntu.com/5260-1/","reference_id":"USN-5260-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5260-1/"},{"reference_url":"https://usn.ubuntu.com/5260-2/","reference_id":"USN-5260-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5260-2/"},{"reference_url":"https://usn.ubuntu.com/5260-3/","reference_id":"USN-5260-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5260-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1038160?format=json","purl":"pkg:deb/debian/samba@2:4.9.5%2Bdfsg-5%2Bdeb10u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2dm7-xt4e-wkex"},{"vulnerability":"VCID-2gkd-vubu-j7fd"},{"vulnerability":"VCID-47k4-8k1s-zff2"},{"vulnerability":"VCID-4qm6-a9un-nyda"},{"vulnerability":"VCID-55zj-6b4s-8ker"},{"vulnerability":"VCID-5vyg-1jzr-ebh8"},{"vulnerability":"VCID-745n-wca7-d7fh"},{"vulnerability":"VCID-76sz-d2yt-buek"},{"vulnerability":"VCID-7bb1-3ny6-rbbv"},{"vulnerability":"VCID-88mw-c7mc-jugp"},{"vulnerability":"VCID-9cyh-d77a-vyhj"},{"vulnerability":"VCID-9t1m-6chr-e3dt"},{"vulnerability":"VCID-cgez-urtv-qbhq"},{"vulnerability":"VCID-crh2-zv3e-pfaa"},{"vulnerability":"VCID-ez9s-vn2t-w7a6"},{"vulnerability":"VCID-ezk6-jy86-y3h4"},{"vulnerability":"VCID-f772-3dtd-wba8"},{"vulnerability":"VCID-f9hv-k2xk-puhq"},{"vulnerability":"VCID-fh3j-efv1-tybp"},{"vulnerability":"VCID-frnd-3wwy-93ek"},{"vulnerability":"VCID-gs98-hcdd-2yf9"},{"vulnerability":"VCID-hnhm-ud2a-nugz"},{"vulnerability":"VCID-hzy4-16j5-8qcf"},{"vulnerability":"VCID-m44e-rw2w-vuhj"},{"vulnerability":"VCID-mgaq-qjdw-fke4"},{"vulnerability":"VCID-mw6j-fkm4-pkg2"},{"vulnerability":"VCID-p1se-92ae-t3b5"},{"vulnerability":"VCID-qt4e-73xg-bqde"},{"vulnerability":"VCID-rgu3-rgej-aucp"},{"vulnerability":"VCID-rnfg-1cgy-jbaq"},{"vulnerability":"VCID-rphh-hzna-nbgf"},{"vulnerability":"VCID-s2ne-rcp3-nbgz"},{"vulnerability":"VCID-s6ma-9h2y-hyc4"},{"vulnerability":"VCID-smxs-4de1-nfec"},{"vulnerability":"VCID-t3zy-v34p-7uen"},{"vulnerability":"VCID-tk1x-bex4-8kbz"},{"vulnerability":"VCID-vg7n-k8px-ayd5"},{"vulnerability":"VCID-vnc5-neuk-m3ar"},{"vulnerability":"VCID-vu43-fq85-a7eq"},{"vulnerability":"VCID-wfhc-ehpe-abaq"},{"vulnerability":"VCID-ws2g-8ye2-pkdk"},{"vulnerability":"VCID-xwke-mduk-kyga"},{"vulnerability":"VCID-xyfs-p969-syfp"},{"vulnerability":"VCID-ycau-9h17-quf3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-5%252Bdeb10u3"},{"url":"http://public2.vulnerablecode.io/api/packages/994567?format=json","purl":"pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-18xs-py1v-xfey"},{"vulnerability":"VCID-28rq-1d68-4bfz"},{"vulnerability":"VCID-2w26-yjmn-k7an"},{"vulnerability":"VCID-3du2-evy8-jfa1"},{"vulnerability":"VCID-5cd3-497h-qkhw"},{"vulnerability":"VCID-68zz-z589-87f6"},{"vulnerability":"VCID-6mju-nwzy-pqeq"},{"vulnerability":"VCID-745n-wca7-d7fh"},{"vulnerability":"VCID-7xdg-sn88-bkbs"},{"vulnerability":"VCID-84q8-2457-qkc5"},{"vulnerability":"VCID-94k8-98me-x3dw"},{"vulnerability":"VCID-apqw-e2px-yka5"},{"vulnerability":"VCID-b4ty-d775-5fed"},{"vulnerability":"VCID-bc1t-hzu5-bffd"},{"vulnerability":"VCID-bpht-9daq-rfgd"},{"vulnerability":"VCID-fskg-j9fe-6yeg"},{"vulnerability":"VCID-hfsk-4cbd-m3b1"},{"vulnerability":"VCID-kkwp-2x9m-9bgd"},{"vulnerability":"VCID-q2d9-vahb-6qce"},{"vulnerability":"VCID-r7va-6j6s-rba5"},{"vulnerability":"VCID-w4c6-p858-rkaw"},{"vulnerability":"VCID-wxva-f9ay-c3a2"},{"vulnerability":"VCID-xmn1-g72k-8qcq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"}],"aliases":["CVE-2021-44142"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7bb1-3ny6-rbbv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47170?format=json","vulnerability_id":"VCID-88mw-c7mc-jugp","summary":"Multiple vulnerabilities have been found in Samba, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14323.json","reference_id":"","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14323.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14323","reference_id":"","reference_type":"","scores":[{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.62077","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.6191","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.61983","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.62015","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.61985","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.62034","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.62051","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.62072","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.62061","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.6204","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.62082","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.62088","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.6207","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.62067","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.62084","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14323"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14323"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1891685","reference_id":"1891685","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T20:46:57Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1891685"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973399","reference_id":"973399","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973399"},{"reference_url":"https://www.samba.org/samba/security/CVE-2020-14323.html","reference_id":"CVE-2020-14323.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T20:46:57Z/"}],"url":"https://www.samba.org/samba/security/CVE-2020-14323.html"},{"reference_url":"https://security.gentoo.org/glsa/202012-24","reference_id":"GLSA-202012-24","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T20:46:57Z/"}],"url":"https://security.gentoo.org/glsa/202012-24"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JE2M4FE3N3EDXVG4UKSVFPL7SQUGFFDP/","reference_id":"JE2M4FE3N3EDXVG4UKSVFPL7SQUGFFDP","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T20:46:57Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JE2M4FE3N3EDXVG4UKSVFPL7SQUGFFDP/"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00008.html","reference_id":"msg00008.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T20:46:57Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00008.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00012.html","reference_id":"msg00012.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T20:46:57Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00012.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html","reference_id":"msg00015.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T20:46:57Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html","reference_id":"msg00041.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T20:46:57Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20201103-0001/","reference_id":"ntap-20201103-0001","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T20:46:57Z/"}],"url":"https://security.netapp.com/advisory/ntap-20201103-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5439","reference_id":"RHSA-2020:5439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1647","reference_id":"RHSA-2021:1647","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1647"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3723","reference_id":"RHSA-2021:3723","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3723"},{"reference_url":"https://usn.ubuntu.com/4611-1/","reference_id":"USN-4611-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4611-1/"},{"reference_url":"https://usn.ubuntu.com/4931-1/","reference_id":"USN-4931-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4931-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6HM73N4NEGFW5GIJJGGP6ZZBS6GTXPB/","reference_id":"W6HM73N4NEGFW5GIJJGGP6ZZBS6GTXPB","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T20:46:57Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6HM73N4NEGFW5GIJJGGP6ZZBS6GTXPB/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994567?format=json","purl":"pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-18xs-py1v-xfey"},{"vulnerability":"VCID-28rq-1d68-4bfz"},{"vulnerability":"VCID-2w26-yjmn-k7an"},{"vulnerability":"VCID-3du2-evy8-jfa1"},{"vulnerability":"VCID-5cd3-497h-qkhw"},{"vulnerability":"VCID-68zz-z589-87f6"},{"vulnerability":"VCID-6mju-nwzy-pqeq"},{"vulnerability":"VCID-745n-wca7-d7fh"},{"vulnerability":"VCID-7xdg-sn88-bkbs"},{"vulnerability":"VCID-84q8-2457-qkc5"},{"vulnerability":"VCID-94k8-98me-x3dw"},{"vulnerability":"VCID-apqw-e2px-yka5"},{"vulnerability":"VCID-b4ty-d775-5fed"},{"vulnerability":"VCID-bc1t-hzu5-bffd"},{"vulnerability":"VCID-bpht-9daq-rfgd"},{"vulnerability":"VCID-fskg-j9fe-6yeg"},{"vulnerability":"VCID-hfsk-4cbd-m3b1"},{"vulnerability":"VCID-kkwp-2x9m-9bgd"},{"vulnerability":"VCID-q2d9-vahb-6qce"},{"vulnerability":"VCID-r7va-6j6s-rba5"},{"vulnerability":"VCID-w4c6-p858-rkaw"},{"vulnerability":"VCID-wxva-f9ay-c3a2"},{"vulnerability":"VCID-xmn1-g72k-8qcq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"}],"aliases":["CVE-2020-14323"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-88mw-c7mc-jugp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/45506?format=json","vulnerability_id":"VCID-9cyh-d77a-vyhj","summary":"Multiple vulnerabilities have been found in Samba, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20254.json","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20254.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-20254","reference_id":"","reference_type":"","scores":[{"value":"0.01764","scoring_system":"epss","scoring_elements":"0.82549","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01764","scoring_system":"epss","scoring_elements":"0.82697","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01764","scoring_system":"epss","scoring_elements":"0.82681","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01764","scoring_system":"epss","scoring_elements":"0.82691","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01764","scoring_system":"epss","scoring_elements":"0.82564","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01764","scoring_system":"epss","scoring_elements":"0.8258","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01764","scoring_system":"epss","scoring_elements":"0.82576","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01764","scoring_system":"epss","scoring_elements":"0.82602","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01764","scoring_system":"epss","scoring_elements":"0.8261","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01764","scoring_system":"epss","scoring_elements":"0.82628","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01764","scoring_system":"epss","scoring_elements":"0.82622","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01764","scoring_system":"epss","scoring_elements":"0.82618","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01764","scoring_system":"epss","scoring_elements":"0.82655","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01764","scoring_system":"epss","scoring_elements":"0.82656","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01764","scoring_system":"epss","scoring_elements":"0.8266","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-20254"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20254","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20254"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1949442","reference_id":"1949442","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1949442"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987811","reference_id":"987811","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987811"},{"reference_url":"https://security.archlinux.org/AVG-1893","reference_id":"AVG-1893","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1893"},{"reference_url":"https://security.gentoo.org/glsa/202105-22","reference_id":"GLSA-202105-22","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202105-22"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2313","reference_id":"RHSA-2021:2313","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2313"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3723","reference_id":"RHSA-2021:3723","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3723"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3724","reference_id":"RHSA-2021:3724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3724"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3988","reference_id":"RHSA-2021:3988","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3988"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4058","reference_id":"RHSA-2021:4058","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4058"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4866","reference_id":"RHSA-2021:4866","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4866"},{"reference_url":"https://usn.ubuntu.com/4930-1/","reference_id":"USN-4930-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4930-1/"},{"reference_url":"https://usn.ubuntu.com/4931-1/","reference_id":"USN-4931-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4931-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994567?format=json","purl":"pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-18xs-py1v-xfey"},{"vulnerability":"VCID-28rq-1d68-4bfz"},{"vulnerability":"VCID-2w26-yjmn-k7an"},{"vulnerability":"VCID-3du2-evy8-jfa1"},{"vulnerability":"VCID-5cd3-497h-qkhw"},{"vulnerability":"VCID-68zz-z589-87f6"},{"vulnerability":"VCID-6mju-nwzy-pqeq"},{"vulnerability":"VCID-745n-wca7-d7fh"},{"vulnerability":"VCID-7xdg-sn88-bkbs"},{"vulnerability":"VCID-84q8-2457-qkc5"},{"vulnerability":"VCID-94k8-98me-x3dw"},{"vulnerability":"VCID-apqw-e2px-yka5"},{"vulnerability":"VCID-b4ty-d775-5fed"},{"vulnerability":"VCID-bc1t-hzu5-bffd"},{"vulnerability":"VCID-bpht-9daq-rfgd"},{"vulnerability":"VCID-fskg-j9fe-6yeg"},{"vulnerability":"VCID-hfsk-4cbd-m3b1"},{"vulnerability":"VCID-kkwp-2x9m-9bgd"},{"vulnerability":"VCID-q2d9-vahb-6qce"},{"vulnerability":"VCID-r7va-6j6s-rba5"},{"vulnerability":"VCID-w4c6-p858-rkaw"},{"vulnerability":"VCID-wxva-f9ay-c3a2"},{"vulnerability":"VCID-xmn1-g72k-8qcq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"}],"aliases":["CVE-2021-20254"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9cyh-d77a-vyhj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/44833?format=json","vulnerability_id":"VCID-9t1m-6chr-e3dt","summary":"Multiple vulnerabilities have been found in Samba, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10745.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10745.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-10745","reference_id":"","reference_type":"","scores":[{"value":"0.19658","scoring_system":"epss","scoring_elements":"0.95388","published_at":"2026-04-01T12:55:00Z"},{"value":"0.19658","scoring_system":"epss","scoring_elements":"0.95441","published_at":"2026-04-29T12:55:00Z"},{"value":"0.19658","scoring_system":"epss","scoring_elements":"0.95439","published_at":"2026-04-21T12:55:00Z"},{"value":"0.19658","scoring_system":"epss","scoring_elements":"0.9544","published_at":"2026-04-24T12:55:00Z"},{"value":"0.19658","scoring_system":"epss","scoring_elements":"0.95397","published_at":"2026-04-02T12:55:00Z"},{"value":"0.19658","scoring_system":"epss","scoring_elements":"0.95403","published_at":"2026-04-04T12:55:00Z"},{"value":"0.19658","scoring_system":"epss","scoring_elements":"0.95406","published_at":"2026-04-07T12:55:00Z"},{"value":"0.19658","scoring_system":"epss","scoring_elements":"0.95413","published_at":"2026-04-08T12:55:00Z"},{"value":"0.19658","scoring_system":"epss","scoring_elements":"0.95416","published_at":"2026-04-09T12:55:00Z"},{"value":"0.19658","scoring_system":"epss","scoring_elements":"0.95421","published_at":"2026-04-12T12:55:00Z"},{"value":"0.19658","scoring_system":"epss","scoring_elements":"0.95423","published_at":"2026-04-13T12:55:00Z"},{"value":"0.19658","scoring_system":"epss","scoring_elements":"0.95431","published_at":"2026-04-16T12:55:00Z"},{"value":"0.19658","scoring_system":"epss","scoring_elements":"0.95435","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-10745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10745"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1849491","reference_id":"1849491","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1849491"},{"reference_url":"https://security.archlinux.org/AVG-1202","reference_id":"AVG-1202","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1202"},{"reference_url":"https://security.gentoo.org/glsa/202007-15","reference_id":"GLSA-202007-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-15"},{"reference_url":"https://usn.ubuntu.com/4409-1/","reference_id":"USN-4409-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4409-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994567?format=json","purl":"pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-18xs-py1v-xfey"},{"vulnerability":"VCID-28rq-1d68-4bfz"},{"vulnerability":"VCID-2w26-yjmn-k7an"},{"vulnerability":"VCID-3du2-evy8-jfa1"},{"vulnerability":"VCID-5cd3-497h-qkhw"},{"vulnerability":"VCID-68zz-z589-87f6"},{"vulnerability":"VCID-6mju-nwzy-pqeq"},{"vulnerability":"VCID-745n-wca7-d7fh"},{"vulnerability":"VCID-7xdg-sn88-bkbs"},{"vulnerability":"VCID-84q8-2457-qkc5"},{"vulnerability":"VCID-94k8-98me-x3dw"},{"vulnerability":"VCID-apqw-e2px-yka5"},{"vulnerability":"VCID-b4ty-d775-5fed"},{"vulnerability":"VCID-bc1t-hzu5-bffd"},{"vulnerability":"VCID-bpht-9daq-rfgd"},{"vulnerability":"VCID-fskg-j9fe-6yeg"},{"vulnerability":"VCID-hfsk-4cbd-m3b1"},{"vulnerability":"VCID-kkwp-2x9m-9bgd"},{"vulnerability":"VCID-q2d9-vahb-6qce"},{"vulnerability":"VCID-r7va-6j6s-rba5"},{"vulnerability":"VCID-w4c6-p858-rkaw"},{"vulnerability":"VCID-wxva-f9ay-c3a2"},{"vulnerability":"VCID-xmn1-g72k-8qcq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"}],"aliases":["CVE-2020-10745"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9t1m-6chr-e3dt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46968?format=json","vulnerability_id":"VCID-cgez-urtv-qbhq","summary":"Multiple vulnerabilities have been discovered in Samba, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34967.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34967.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-34967","reference_id":"","reference_type":"","scores":[{"value":"0.18271","scoring_system":"epss","scoring_elements":"0.95225","published_at":"2026-04-29T12:55:00Z"},{"value":"0.18271","scoring_system":"epss","scoring_elements":"0.95222","published_at":"2026-04-24T12:55:00Z"},{"value":"0.21174","scoring_system":"epss","scoring_elements":"0.95637","published_at":"2026-04-02T12:55:00Z"},{"value":"0.21174","scoring_system":"epss","scoring_elements":"0.95645","published_at":"2026-04-07T12:55:00Z"},{"value":"0.21174","scoring_system":"epss","scoring_elements":"0.95653","published_at":"2026-04-08T12:55:00Z"},{"value":"0.21174","scoring_system":"epss","scoring_elements":"0.95657","published_at":"2026-04-09T12:55:00Z"},{"value":"0.21174","scoring_system":"epss","scoring_elements":"0.95662","published_at":"2026-04-11T12:55:00Z"},{"value":"0.21174","scoring_system":"epss","scoring_elements":"0.95661","published_at":"2026-04-12T12:55:00Z"},{"value":"0.21174","scoring_system":"epss","scoring_elements":"0.95664","published_at":"2026-04-13T12:55:00Z"},{"value":"0.21174","scoring_system":"epss","scoring_elements":"0.95672","published_at":"2026-04-16T12:55:00Z"},{"value":"0.21174","scoring_system":"epss","scoring_elements":"0.95676","published_at":"2026-04-18T12:55:00Z"},{"value":"0.21174","scoring_system":"epss","scoring_elements":"0.95642","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-34967"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2222794","reference_id":"2222794","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2222794"},{"reference_url":"https://security.gentoo.org/glsa/202402-28","reference_id":"GLSA-202402-28","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-28"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6667","reference_id":"RHSA-2023:6667","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6667"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7139","reference_id":"RHSA-2023:7139","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7139"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0423","reference_id":"RHSA-2024:0423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0580","reference_id":"RHSA-2024:0580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0580"},{"reference_url":"https://usn.ubuntu.com/6238-1/","reference_id":"USN-6238-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6238-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994567?format=json","purl":"pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-18xs-py1v-xfey"},{"vulnerability":"VCID-28rq-1d68-4bfz"},{"vulnerability":"VCID-2w26-yjmn-k7an"},{"vulnerability":"VCID-3du2-evy8-jfa1"},{"vulnerability":"VCID-5cd3-497h-qkhw"},{"vulnerability":"VCID-68zz-z589-87f6"},{"vulnerability":"VCID-6mju-nwzy-pqeq"},{"vulnerability":"VCID-745n-wca7-d7fh"},{"vulnerability":"VCID-7xdg-sn88-bkbs"},{"vulnerability":"VCID-84q8-2457-qkc5"},{"vulnerability":"VCID-94k8-98me-x3dw"},{"vulnerability":"VCID-apqw-e2px-yka5"},{"vulnerability":"VCID-b4ty-d775-5fed"},{"vulnerability":"VCID-bc1t-hzu5-bffd"},{"vulnerability":"VCID-bpht-9daq-rfgd"},{"vulnerability":"VCID-fskg-j9fe-6yeg"},{"vulnerability":"VCID-hfsk-4cbd-m3b1"},{"vulnerability":"VCID-kkwp-2x9m-9bgd"},{"vulnerability":"VCID-q2d9-vahb-6qce"},{"vulnerability":"VCID-r7va-6j6s-rba5"},{"vulnerability":"VCID-w4c6-p858-rkaw"},{"vulnerability":"VCID-wxva-f9ay-c3a2"},{"vulnerability":"VCID-xmn1-g72k-8qcq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"}],"aliases":["CVE-2023-34967"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cgez-urtv-qbhq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47967?format=json","vulnerability_id":"VCID-crh2-zv3e-pfaa","summary":"Multiple vulnerabilities have been found in Samba, the worst of\n    which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14907.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14907.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-14907","reference_id":"","reference_type":"","scores":[{"value":"0.10242","scoring_system":"epss","scoring_elements":"0.93119","published_at":"2026-04-01T12:55:00Z"},{"value":"0.10242","scoring_system":"epss","scoring_elements":"0.93129","published_at":"2026-04-02T12:55:00Z"},{"value":"0.10242","scoring_system":"epss","scoring_elements":"0.93132","published_at":"2026-04-04T12:55:00Z"},{"value":"0.10242","scoring_system":"epss","scoring_elements":"0.93131","published_at":"2026-04-07T12:55:00Z"},{"value":"0.10242","scoring_system":"epss","scoring_elements":"0.9314","published_at":"2026-04-08T12:55:00Z"},{"value":"0.10242","scoring_system":"epss","scoring_elements":"0.93144","published_at":"2026-04-09T12:55:00Z"},{"value":"0.10242","scoring_system":"epss","scoring_elements":"0.9315","published_at":"2026-04-11T12:55:00Z"},{"value":"0.10242","scoring_system":"epss","scoring_elements":"0.93147","published_at":"2026-04-12T12:55:00Z"},{"value":"0.10242","scoring_system":"epss","scoring_elements":"0.93148","published_at":"2026-04-13T12:55:00Z"},{"value":"0.10242","scoring_system":"epss","scoring_elements":"0.93165","published_at":"2026-04-16T12:55:00Z"},{"value":"0.10242","scoring_system":"epss","scoring_elements":"0.93169","published_at":"2026-04-18T12:55:00Z"},{"value":"0.10242","scoring_system":"epss","scoring_elements":"0.93177","published_at":"2026-04-21T12:55:00Z"},{"value":"0.10242","scoring_system":"epss","scoring_elements":"0.93182","published_at":"2026-04-24T12:55:00Z"},{"value":"0.10242","scoring_system":"epss","scoring_elements":"0.93181","published_at":"2026-04-26T12:55:00Z"},{"value":"0.10242","scoring_system":"epss","scoring_elements":"0.93178","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-14907"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14907","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14907"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1791207","reference_id":"1791207","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1791207"},{"reference_url":"https://security.gentoo.org/glsa/202003-52","reference_id":"GLSA-202003-52","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-52"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0943","reference_id":"RHSA-2020:0943","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0943"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1878","reference_id":"RHSA-2020:1878","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1878"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3981","reference_id":"RHSA-2020:3981","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3981"},{"reference_url":"https://usn.ubuntu.com/4244-1/","reference_id":"USN-4244-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4244-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994567?format=json","purl":"pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-18xs-py1v-xfey"},{"vulnerability":"VCID-28rq-1d68-4bfz"},{"vulnerability":"VCID-2w26-yjmn-k7an"},{"vulnerability":"VCID-3du2-evy8-jfa1"},{"vulnerability":"VCID-5cd3-497h-qkhw"},{"vulnerability":"VCID-68zz-z589-87f6"},{"vulnerability":"VCID-6mju-nwzy-pqeq"},{"vulnerability":"VCID-745n-wca7-d7fh"},{"vulnerability":"VCID-7xdg-sn88-bkbs"},{"vulnerability":"VCID-84q8-2457-qkc5"},{"vulnerability":"VCID-94k8-98me-x3dw"},{"vulnerability":"VCID-apqw-e2px-yka5"},{"vulnerability":"VCID-b4ty-d775-5fed"},{"vulnerability":"VCID-bc1t-hzu5-bffd"},{"vulnerability":"VCID-bpht-9daq-rfgd"},{"vulnerability":"VCID-fskg-j9fe-6yeg"},{"vulnerability":"VCID-hfsk-4cbd-m3b1"},{"vulnerability":"VCID-kkwp-2x9m-9bgd"},{"vulnerability":"VCID-q2d9-vahb-6qce"},{"vulnerability":"VCID-r7va-6j6s-rba5"},{"vulnerability":"VCID-w4c6-p858-rkaw"},{"vulnerability":"VCID-wxva-f9ay-c3a2"},{"vulnerability":"VCID-xmn1-g72k-8qcq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"}],"aliases":["CVE-2019-14907"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-crh2-zv3e-pfaa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46969?format=json","vulnerability_id":"VCID-ez9s-vn2t-w7a6","summary":"Multiple vulnerabilities have been discovered in Samba, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34968.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34968.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-34968","reference_id":"","reference_type":"","scores":[{"value":"0.02202","scoring_system":"epss","scoring_elements":"0.84491","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02202","scoring_system":"epss","scoring_elements":"0.84452","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02202","scoring_system":"epss","scoring_elements":"0.84478","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02202","scoring_system":"epss","scoring_elements":"0.84487","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02387","scoring_system":"epss","scoring_elements":"0.84969","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02387","scoring_system":"epss","scoring_elements":"0.84999","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02387","scoring_system":"epss","scoring_elements":"0.85015","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02387","scoring_system":"epss","scoring_elements":"0.85013","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02387","scoring_system":"epss","scoring_elements":"0.8501","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02387","scoring_system":"epss","scoring_elements":"0.85031","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02387","scoring_system":"epss","scoring_elements":"0.85033","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02387","scoring_system":"epss","scoring_elements":"0.84992","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02387","scoring_system":"epss","scoring_elements":"0.84947","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02387","scoring_system":"epss","scoring_elements":"0.84965","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-34968"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2222795","reference_id":"2222795","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2222795"},{"reference_url":"https://security.gentoo.org/glsa/202402-28","reference_id":"GLSA-202402-28","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-28"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6667","reference_id":"RHSA-2023:6667","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6667"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7139","reference_id":"RHSA-2023:7139","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7139"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0423","reference_id":"RHSA-2024:0423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0580","reference_id":"RHSA-2024:0580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0580"},{"reference_url":"https://usn.ubuntu.com/6238-1/","reference_id":"USN-6238-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6238-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994567?format=json","purl":"pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-18xs-py1v-xfey"},{"vulnerability":"VCID-28rq-1d68-4bfz"},{"vulnerability":"VCID-2w26-yjmn-k7an"},{"vulnerability":"VCID-3du2-evy8-jfa1"},{"vulnerability":"VCID-5cd3-497h-qkhw"},{"vulnerability":"VCID-68zz-z589-87f6"},{"vulnerability":"VCID-6mju-nwzy-pqeq"},{"vulnerability":"VCID-745n-wca7-d7fh"},{"vulnerability":"VCID-7xdg-sn88-bkbs"},{"vulnerability":"VCID-84q8-2457-qkc5"},{"vulnerability":"VCID-94k8-98me-x3dw"},{"vulnerability":"VCID-apqw-e2px-yka5"},{"vulnerability":"VCID-b4ty-d775-5fed"},{"vulnerability":"VCID-bc1t-hzu5-bffd"},{"vulnerability":"VCID-bpht-9daq-rfgd"},{"vulnerability":"VCID-fskg-j9fe-6yeg"},{"vulnerability":"VCID-hfsk-4cbd-m3b1"},{"vulnerability":"VCID-kkwp-2x9m-9bgd"},{"vulnerability":"VCID-q2d9-vahb-6qce"},{"vulnerability":"VCID-r7va-6j6s-rba5"},{"vulnerability":"VCID-w4c6-p858-rkaw"},{"vulnerability":"VCID-wxva-f9ay-c3a2"},{"vulnerability":"VCID-xmn1-g72k-8qcq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"}],"aliases":["CVE-2023-34968"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ez9s-vn2t-w7a6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48472?format=json","vulnerability_id":"VCID-ezk6-jy86-y3h4","summary":"Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2124.json","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2124.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2124","reference_id":"","reference_type":"","scores":[{"value":"0.00699","scoring_system":"epss","scoring_elements":"0.72052","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00699","scoring_system":"epss","scoring_elements":"0.71974","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00699","scoring_system":"epss","scoring_elements":"0.72015","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00699","scoring_system":"epss","scoring_elements":"0.72022","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00699","scoring_system":"epss","scoring_elements":"0.72007","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00699","scoring_system":"epss","scoring_elements":"0.72051","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00699","scoring_system":"epss","scoring_elements":"0.72057","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00699","scoring_system":"epss","scoring_elements":"0.71931","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00699","scoring_system":"epss","scoring_elements":"0.7197","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00699","scoring_system":"epss","scoring_elements":"0.71982","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00699","scoring_system":"epss","scoring_elements":"0.72006","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00699","scoring_system":"epss","scoring_elements":"0.71989","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00814","scoring_system":"epss","scoring_elements":"0.74225","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00814","scoring_system":"epss","scoring_elements":"0.74252","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00814","scoring_system":"epss","scoring_elements":"0.7422","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.9","scoring_system":"cvssv2","scoring_elements":"AV:A/AC:M/Au:N/C:P/I:N/A:N"},{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2019660","reference_id":"2019660","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2019660"},{"reference_url":"https://security.archlinux.org/AVG-2539","reference_id":"AVG-2539","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2539"},{"reference_url":"https://security.gentoo.org/glsa/202309-06","reference_id":"GLSA-202309-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202309-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4843","reference_id":"RHSA-2021:4843","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4843"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4844","reference_id":"RHSA-2021:4844","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4844"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:5082","reference_id":"RHSA-2021:5082","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:5082"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:5192","reference_id":"RHSA-2021:5192","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:5192"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0008","reference_id":"RHSA-2022:0008","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0008"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0074","reference_id":"RHSA-2022:0074","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0074"},{"reference_url":"https://usn.ubuntu.com/5142-1/","reference_id":"USN-5142-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5142-1/"},{"reference_url":"https://usn.ubuntu.com/5174-1/","reference_id":"USN-5174-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5174-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994567?format=json","purl":"pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-18xs-py1v-xfey"},{"vulnerability":"VCID-28rq-1d68-4bfz"},{"vulnerability":"VCID-2w26-yjmn-k7an"},{"vulnerability":"VCID-3du2-evy8-jfa1"},{"vulnerability":"VCID-5cd3-497h-qkhw"},{"vulnerability":"VCID-68zz-z589-87f6"},{"vulnerability":"VCID-6mju-nwzy-pqeq"},{"vulnerability":"VCID-745n-wca7-d7fh"},{"vulnerability":"VCID-7xdg-sn88-bkbs"},{"vulnerability":"VCID-84q8-2457-qkc5"},{"vulnerability":"VCID-94k8-98me-x3dw"},{"vulnerability":"VCID-apqw-e2px-yka5"},{"vulnerability":"VCID-b4ty-d775-5fed"},{"vulnerability":"VCID-bc1t-hzu5-bffd"},{"vulnerability":"VCID-bpht-9daq-rfgd"},{"vulnerability":"VCID-fskg-j9fe-6yeg"},{"vulnerability":"VCID-hfsk-4cbd-m3b1"},{"vulnerability":"VCID-kkwp-2x9m-9bgd"},{"vulnerability":"VCID-q2d9-vahb-6qce"},{"vulnerability":"VCID-r7va-6j6s-rba5"},{"vulnerability":"VCID-w4c6-p858-rkaw"},{"vulnerability":"VCID-wxva-f9ay-c3a2"},{"vulnerability":"VCID-xmn1-g72k-8qcq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"}],"aliases":["CVE-2016-2124"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ezk6-jy86-y3h4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48493?format=json","vulnerability_id":"VCID-f772-3dtd-wba8","summary":"Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32742.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32742.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32742","reference_id":"","reference_type":"","scores":[{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50607","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00574","scoring_system":"epss","scoring_elements":"0.68802","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00574","scoring_system":"epss","scoring_elements":"0.68754","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00574","scoring_system":"epss","scoring_elements":"0.6874","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00574","scoring_system":"epss","scoring_elements":"0.68711","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00574","scoring_system":"epss","scoring_elements":"0.68753","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00574","scoring_system":"epss","scoring_elements":"0.68764","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00574","scoring_system":"epss","scoring_elements":"0.68742","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00574","scoring_system":"epss","scoring_elements":"0.6879","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00574","scoring_system":"epss","scoring_elements":"0.68796","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00574","scoring_system":"epss","scoring_elements":"0.68685","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00574","scoring_system":"epss","scoring_elements":"0.68662","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00574","scoring_system":"epss","scoring_elements":"0.68714","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00574","scoring_system":"epss","scoring_elements":"0.68732","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32742"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449","reference_id":"1016449","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2108196","reference_id":"2108196","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2108196"},{"reference_url":"https://security.archlinux.org/AVG-2782","reference_id":"AVG-2782","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2782"},{"reference_url":"https://www.samba.org/samba/security/CVE-2022-32742.html","reference_id":"CVE-2022-32742.html","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T19:44:06Z/"}],"url":"https://www.samba.org/samba/security/CVE-2022-32742.html"},{"reference_url":"https://security.gentoo.org/glsa/202309-06","reference_id":"GLSA-202309-06","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T19:44:06Z/"}],"url":"https://security.gentoo.org/glsa/202309-06"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html","reference_id":"msg00015.html","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T19:44:06Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7056","reference_id":"RHSA-2022:7056","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7056"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7111","reference_id":"RHSA-2022:7111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8317","reference_id":"RHSA-2022:8317","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8317"},{"reference_url":"https://usn.ubuntu.com/5542-1/","reference_id":"USN-5542-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5542-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994567?format=json","purl":"pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-18xs-py1v-xfey"},{"vulnerability":"VCID-28rq-1d68-4bfz"},{"vulnerability":"VCID-2w26-yjmn-k7an"},{"vulnerability":"VCID-3du2-evy8-jfa1"},{"vulnerability":"VCID-5cd3-497h-qkhw"},{"vulnerability":"VCID-68zz-z589-87f6"},{"vulnerability":"VCID-6mju-nwzy-pqeq"},{"vulnerability":"VCID-745n-wca7-d7fh"},{"vulnerability":"VCID-7xdg-sn88-bkbs"},{"vulnerability":"VCID-84q8-2457-qkc5"},{"vulnerability":"VCID-94k8-98me-x3dw"},{"vulnerability":"VCID-apqw-e2px-yka5"},{"vulnerability":"VCID-b4ty-d775-5fed"},{"vulnerability":"VCID-bc1t-hzu5-bffd"},{"vulnerability":"VCID-bpht-9daq-rfgd"},{"vulnerability":"VCID-fskg-j9fe-6yeg"},{"vulnerability":"VCID-hfsk-4cbd-m3b1"},{"vulnerability":"VCID-kkwp-2x9m-9bgd"},{"vulnerability":"VCID-q2d9-vahb-6qce"},{"vulnerability":"VCID-r7va-6j6s-rba5"},{"vulnerability":"VCID-w4c6-p858-rkaw"},{"vulnerability":"VCID-wxva-f9ay-c3a2"},{"vulnerability":"VCID-xmn1-g72k-8qcq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"}],"aliases":["CVE-2022-32742"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f772-3dtd-wba8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48476?format=json","vulnerability_id":"VCID-f9hv-k2xk-puhq","summary":"Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25719.json","reference_id":"","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25719.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25719","reference_id":"","reference_type":"","scores":[{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43692","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43893","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43885","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43818","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.4377","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43773","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43809","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43859","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43862","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.4388","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43848","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43831","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00248","scoring_system":"epss","scoring_elements":"0.4808","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00248","scoring_system":"epss","scoring_elements":"0.48101","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00248","scoring_system":"epss","scoring_elements":"0.48042","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25719"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2019732","reference_id":"2019732","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2019732"},{"reference_url":"https://security.archlinux.org/AVG-2538","reference_id":"AVG-2538","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2538"},{"reference_url":"https://security.gentoo.org/glsa/202309-06","reference_id":"GLSA-202309-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202309-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:5142","reference_id":"RHSA-2021:5142","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:5142"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:5195","reference_id":"RHSA-2021:5195","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:5195"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0007","reference_id":"RHSA-2022:0007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0007"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0076","reference_id":"RHSA-2022:0076","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0076"},{"reference_url":"https://usn.ubuntu.com/5142-1/","reference_id":"USN-5142-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5142-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994567?format=json","purl":"pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-18xs-py1v-xfey"},{"vulnerability":"VCID-28rq-1d68-4bfz"},{"vulnerability":"VCID-2w26-yjmn-k7an"},{"vulnerability":"VCID-3du2-evy8-jfa1"},{"vulnerability":"VCID-5cd3-497h-qkhw"},{"vulnerability":"VCID-68zz-z589-87f6"},{"vulnerability":"VCID-6mju-nwzy-pqeq"},{"vulnerability":"VCID-745n-wca7-d7fh"},{"vulnerability":"VCID-7xdg-sn88-bkbs"},{"vulnerability":"VCID-84q8-2457-qkc5"},{"vulnerability":"VCID-94k8-98me-x3dw"},{"vulnerability":"VCID-apqw-e2px-yka5"},{"vulnerability":"VCID-b4ty-d775-5fed"},{"vulnerability":"VCID-bc1t-hzu5-bffd"},{"vulnerability":"VCID-bpht-9daq-rfgd"},{"vulnerability":"VCID-fskg-j9fe-6yeg"},{"vulnerability":"VCID-hfsk-4cbd-m3b1"},{"vulnerability":"VCID-kkwp-2x9m-9bgd"},{"vulnerability":"VCID-q2d9-vahb-6qce"},{"vulnerability":"VCID-r7va-6j6s-rba5"},{"vulnerability":"VCID-w4c6-p858-rkaw"},{"vulnerability":"VCID-wxva-f9ay-c3a2"},{"vulnerability":"VCID-xmn1-g72k-8qcq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"}],"aliases":["CVE-2020-25719"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f9hv-k2xk-puhq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/44825?format=json","vulnerability_id":"VCID-fh3j-efv1-tybp","summary":"Multiple vulnerabilities have been found in Samba, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10700.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10700.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-10700","reference_id":"","reference_type":"","scores":[{"value":"0.02857","scoring_system":"epss","scoring_elements":"0.86182","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02857","scoring_system":"epss","scoring_elements":"0.86192","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02857","scoring_system":"epss","scoring_elements":"0.86205","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02857","scoring_system":"epss","scoring_elements":"0.86224","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02857","scoring_system":"epss","scoring_elements":"0.86235","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02857","scoring_system":"epss","scoring_elements":"0.8625","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02857","scoring_system":"epss","scoring_elements":"0.86247","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02857","scoring_system":"epss","scoring_elements":"0.86243","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02857","scoring_system":"epss","scoring_elements":"0.8626","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02857","scoring_system":"epss","scoring_elements":"0.86265","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02857","scoring_system":"epss","scoring_elements":"0.86259","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02857","scoring_system":"epss","scoring_elements":"0.86278","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02857","scoring_system":"epss","scoring_elements":"0.86288","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-10700"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10700","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10700"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1825731","reference_id":"1825731","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1825731"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960189","reference_id":"960189","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960189"},{"reference_url":"https://security.gentoo.org/glsa/202007-15","reference_id":"GLSA-202007-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-15"},{"reference_url":"https://usn.ubuntu.com/4341-1/","reference_id":"USN-4341-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4341-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994567?format=json","purl":"pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-18xs-py1v-xfey"},{"vulnerability":"VCID-28rq-1d68-4bfz"},{"vulnerability":"VCID-2w26-yjmn-k7an"},{"vulnerability":"VCID-3du2-evy8-jfa1"},{"vulnerability":"VCID-5cd3-497h-qkhw"},{"vulnerability":"VCID-68zz-z589-87f6"},{"vulnerability":"VCID-6mju-nwzy-pqeq"},{"vulnerability":"VCID-745n-wca7-d7fh"},{"vulnerability":"VCID-7xdg-sn88-bkbs"},{"vulnerability":"VCID-84q8-2457-qkc5"},{"vulnerability":"VCID-94k8-98me-x3dw"},{"vulnerability":"VCID-apqw-e2px-yka5"},{"vulnerability":"VCID-b4ty-d775-5fed"},{"vulnerability":"VCID-bc1t-hzu5-bffd"},{"vulnerability":"VCID-bpht-9daq-rfgd"},{"vulnerability":"VCID-fskg-j9fe-6yeg"},{"vulnerability":"VCID-hfsk-4cbd-m3b1"},{"vulnerability":"VCID-kkwp-2x9m-9bgd"},{"vulnerability":"VCID-q2d9-vahb-6qce"},{"vulnerability":"VCID-r7va-6j6s-rba5"},{"vulnerability":"VCID-w4c6-p858-rkaw"},{"vulnerability":"VCID-wxva-f9ay-c3a2"},{"vulnerability":"VCID-xmn1-g72k-8qcq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"}],"aliases":["CVE-2020-10700"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fh3j-efv1-tybp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47964?format=json","vulnerability_id":"VCID-frnd-3wwy-93ek","summary":"Multiple vulnerabilities have been found in Samba, the worst of\n    which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14870.json","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14870.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-14870","reference_id":"","reference_type":"","scores":[{"value":"0.04669","scoring_system":"epss","scoring_elements":"0.89278","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04669","scoring_system":"epss","scoring_elements":"0.89283","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04669","scoring_system":"epss","scoring_elements":"0.89297","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04669","scoring_system":"epss","scoring_elements":"0.893","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04669","scoring_system":"epss","scoring_elements":"0.89317","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04669","scoring_system":"epss","scoring_elements":"0.89321","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04669","scoring_system":"epss","scoring_elements":"0.8933","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04669","scoring_system":"epss","scoring_elements":"0.89328","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04669","scoring_system":"epss","scoring_elements":"0.89324","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04669","scoring_system":"epss","scoring_elements":"0.89338","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04669","scoring_system":"epss","scoring_elements":"0.89337","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04669","scoring_system":"epss","scoring_elements":"0.89332","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04669","scoring_system":"epss","scoring_elements":"0.8935","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04669","scoring_system":"epss","scoring_elements":"0.89354","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04669","scoring_system":"epss","scoring_elements":"0.89357","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-14870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14870","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14870"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1778589","reference_id":"1778589","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1778589"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946786","reference_id":"946786","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946786"},{"reference_url":"https://security.gentoo.org/glsa/202003-52","reference_id":"GLSA-202003-52","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-52"},{"reference_url":"https://security.gentoo.org/glsa/202310-06","reference_id":"GLSA-202310-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202310-06"},{"reference_url":"https://usn.ubuntu.com/4217-1/","reference_id":"USN-4217-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4217-1/"},{"reference_url":"https://usn.ubuntu.com/4217-2/","reference_id":"USN-4217-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4217-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994567?format=json","purl":"pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-18xs-py1v-xfey"},{"vulnerability":"VCID-28rq-1d68-4bfz"},{"vulnerability":"VCID-2w26-yjmn-k7an"},{"vulnerability":"VCID-3du2-evy8-jfa1"},{"vulnerability":"VCID-5cd3-497h-qkhw"},{"vulnerability":"VCID-68zz-z589-87f6"},{"vulnerability":"VCID-6mju-nwzy-pqeq"},{"vulnerability":"VCID-745n-wca7-d7fh"},{"vulnerability":"VCID-7xdg-sn88-bkbs"},{"vulnerability":"VCID-84q8-2457-qkc5"},{"vulnerability":"VCID-94k8-98me-x3dw"},{"vulnerability":"VCID-apqw-e2px-yka5"},{"vulnerability":"VCID-b4ty-d775-5fed"},{"vulnerability":"VCID-bc1t-hzu5-bffd"},{"vulnerability":"VCID-bpht-9daq-rfgd"},{"vulnerability":"VCID-fskg-j9fe-6yeg"},{"vulnerability":"VCID-hfsk-4cbd-m3b1"},{"vulnerability":"VCID-kkwp-2x9m-9bgd"},{"vulnerability":"VCID-q2d9-vahb-6qce"},{"vulnerability":"VCID-r7va-6j6s-rba5"},{"vulnerability":"VCID-w4c6-p858-rkaw"},{"vulnerability":"VCID-wxva-f9ay-c3a2"},{"vulnerability":"VCID-xmn1-g72k-8qcq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"}],"aliases":["CVE-2019-14870"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"4.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-frnd-3wwy-93ek"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48474?format=json","vulnerability_id":"VCID-gs98-hcdd-2yf9","summary":"Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25717.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25717.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25717","reference_id":"","reference_type":"","scores":[{"value":"0.00517","scoring_system":"epss","scoring_elements":"0.66756","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00517","scoring_system":"epss","scoring_elements":"0.66723","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00517","scoring_system":"epss","scoring_elements":"0.66737","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00517","scoring_system":"epss","scoring_elements":"0.66722","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00517","scoring_system":"epss","scoring_elements":"0.66746","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00517","scoring_system":"epss","scoring_elements":"0.66758","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00517","scoring_system":"epss","scoring_elements":"0.66649","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00517","scoring_system":"epss","scoring_elements":"0.66698","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00517","scoring_system":"epss","scoring_elements":"0.66713","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00517","scoring_system":"epss","scoring_elements":"0.66732","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00517","scoring_system":"epss","scoring_elements":"0.6672","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00517","scoring_system":"epss","scoring_elements":"0.6669","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00518","scoring_system":"epss","scoring_elements":"0.66712","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00518","scoring_system":"epss","scoring_elements":"0.66738","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00518","scoring_system":"epss","scoring_elements":"0.66673","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25717"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2019672","reference_id":"2019672","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2019672"},{"reference_url":"https://security.archlinux.org/AVG-2538","reference_id":"AVG-2538","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2538"},{"reference_url":"https://security.gentoo.org/glsa/202309-06","reference_id":"GLSA-202309-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202309-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4843","reference_id":"RHSA-2021:4843","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4843"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4844","reference_id":"RHSA-2021:4844","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4844"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:5082","reference_id":"RHSA-2021:5082","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:5082"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:5192","reference_id":"RHSA-2021:5192","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:5192"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0008","reference_id":"RHSA-2022:0008","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0008"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0074","reference_id":"RHSA-2022:0074","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0074"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0133","reference_id":"RHSA-2022:0133","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0133"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0443","reference_id":"RHSA-2022:0443","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0443"},{"reference_url":"https://usn.ubuntu.com/5142-1/","reference_id":"USN-5142-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5142-1/"},{"reference_url":"https://usn.ubuntu.com/5174-1/","reference_id":"USN-5174-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5174-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1038160?format=json","purl":"pkg:deb/debian/samba@2:4.9.5%2Bdfsg-5%2Bdeb10u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2dm7-xt4e-wkex"},{"vulnerability":"VCID-2gkd-vubu-j7fd"},{"vulnerability":"VCID-47k4-8k1s-zff2"},{"vulnerability":"VCID-4qm6-a9un-nyda"},{"vulnerability":"VCID-55zj-6b4s-8ker"},{"vulnerability":"VCID-5vyg-1jzr-ebh8"},{"vulnerability":"VCID-745n-wca7-d7fh"},{"vulnerability":"VCID-76sz-d2yt-buek"},{"vulnerability":"VCID-7bb1-3ny6-rbbv"},{"vulnerability":"VCID-88mw-c7mc-jugp"},{"vulnerability":"VCID-9cyh-d77a-vyhj"},{"vulnerability":"VCID-9t1m-6chr-e3dt"},{"vulnerability":"VCID-cgez-urtv-qbhq"},{"vulnerability":"VCID-crh2-zv3e-pfaa"},{"vulnerability":"VCID-ez9s-vn2t-w7a6"},{"vulnerability":"VCID-ezk6-jy86-y3h4"},{"vulnerability":"VCID-f772-3dtd-wba8"},{"vulnerability":"VCID-f9hv-k2xk-puhq"},{"vulnerability":"VCID-fh3j-efv1-tybp"},{"vulnerability":"VCID-frnd-3wwy-93ek"},{"vulnerability":"VCID-gs98-hcdd-2yf9"},{"vulnerability":"VCID-hnhm-ud2a-nugz"},{"vulnerability":"VCID-hzy4-16j5-8qcf"},{"vulnerability":"VCID-m44e-rw2w-vuhj"},{"vulnerability":"VCID-mgaq-qjdw-fke4"},{"vulnerability":"VCID-mw6j-fkm4-pkg2"},{"vulnerability":"VCID-p1se-92ae-t3b5"},{"vulnerability":"VCID-qt4e-73xg-bqde"},{"vulnerability":"VCID-rgu3-rgej-aucp"},{"vulnerability":"VCID-rnfg-1cgy-jbaq"},{"vulnerability":"VCID-rphh-hzna-nbgf"},{"vulnerability":"VCID-s2ne-rcp3-nbgz"},{"vulnerability":"VCID-s6ma-9h2y-hyc4"},{"vulnerability":"VCID-smxs-4de1-nfec"},{"vulnerability":"VCID-t3zy-v34p-7uen"},{"vulnerability":"VCID-tk1x-bex4-8kbz"},{"vulnerability":"VCID-vg7n-k8px-ayd5"},{"vulnerability":"VCID-vnc5-neuk-m3ar"},{"vulnerability":"VCID-vu43-fq85-a7eq"},{"vulnerability":"VCID-wfhc-ehpe-abaq"},{"vulnerability":"VCID-ws2g-8ye2-pkdk"},{"vulnerability":"VCID-xwke-mduk-kyga"},{"vulnerability":"VCID-xyfs-p969-syfp"},{"vulnerability":"VCID-ycau-9h17-quf3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-5%252Bdeb10u3"},{"url":"http://public2.vulnerablecode.io/api/packages/994567?format=json","purl":"pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-18xs-py1v-xfey"},{"vulnerability":"VCID-28rq-1d68-4bfz"},{"vulnerability":"VCID-2w26-yjmn-k7an"},{"vulnerability":"VCID-3du2-evy8-jfa1"},{"vulnerability":"VCID-5cd3-497h-qkhw"},{"vulnerability":"VCID-68zz-z589-87f6"},{"vulnerability":"VCID-6mju-nwzy-pqeq"},{"vulnerability":"VCID-745n-wca7-d7fh"},{"vulnerability":"VCID-7xdg-sn88-bkbs"},{"vulnerability":"VCID-84q8-2457-qkc5"},{"vulnerability":"VCID-94k8-98me-x3dw"},{"vulnerability":"VCID-apqw-e2px-yka5"},{"vulnerability":"VCID-b4ty-d775-5fed"},{"vulnerability":"VCID-bc1t-hzu5-bffd"},{"vulnerability":"VCID-bpht-9daq-rfgd"},{"vulnerability":"VCID-fskg-j9fe-6yeg"},{"vulnerability":"VCID-hfsk-4cbd-m3b1"},{"vulnerability":"VCID-kkwp-2x9m-9bgd"},{"vulnerability":"VCID-q2d9-vahb-6qce"},{"vulnerability":"VCID-r7va-6j6s-rba5"},{"vulnerability":"VCID-w4c6-p858-rkaw"},{"vulnerability":"VCID-wxva-f9ay-c3a2"},{"vulnerability":"VCID-xmn1-g72k-8qcq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"}],"aliases":["CVE-2020-25717"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gs98-hcdd-2yf9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48478?format=json","vulnerability_id":"VCID-hnhm-ud2a-nugz","summary":"Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25722.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25722.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25722","reference_id":"","reference_type":"","scores":[{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61424","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61439","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61443","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61427","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61415","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61429","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61351","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61398","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61414","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61435","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.6142","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61401","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61415","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61443","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61338","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2019764","reference_id":"2019764","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2019764"},{"reference_url":"https://security.archlinux.org/AVG-2538","reference_id":"AVG-2538","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2538"},{"reference_url":"https://security.gentoo.org/glsa/202309-06","reference_id":"GLSA-202309-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202309-06"},{"reference_url":"https://usn.ubuntu.com/5142-1/","reference_id":"USN-5142-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5142-1/"},{"reference_url":"https://usn.ubuntu.com/5174-1/","reference_id":"USN-5174-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5174-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994567?format=json","purl":"pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-18xs-py1v-xfey"},{"vulnerability":"VCID-28rq-1d68-4bfz"},{"vulnerability":"VCID-2w26-yjmn-k7an"},{"vulnerability":"VCID-3du2-evy8-jfa1"},{"vulnerability":"VCID-5cd3-497h-qkhw"},{"vulnerability":"VCID-68zz-z589-87f6"},{"vulnerability":"VCID-6mju-nwzy-pqeq"},{"vulnerability":"VCID-745n-wca7-d7fh"},{"vulnerability":"VCID-7xdg-sn88-bkbs"},{"vulnerability":"VCID-84q8-2457-qkc5"},{"vulnerability":"VCID-94k8-98me-x3dw"},{"vulnerability":"VCID-apqw-e2px-yka5"},{"vulnerability":"VCID-b4ty-d775-5fed"},{"vulnerability":"VCID-bc1t-hzu5-bffd"},{"vulnerability":"VCID-bpht-9daq-rfgd"},{"vulnerability":"VCID-fskg-j9fe-6yeg"},{"vulnerability":"VCID-hfsk-4cbd-m3b1"},{"vulnerability":"VCID-kkwp-2x9m-9bgd"},{"vulnerability":"VCID-q2d9-vahb-6qce"},{"vulnerability":"VCID-r7va-6j6s-rba5"},{"vulnerability":"VCID-w4c6-p858-rkaw"},{"vulnerability":"VCID-wxva-f9ay-c3a2"},{"vulnerability":"VCID-xmn1-g72k-8qcq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"}],"aliases":["CVE-2020-25722"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hnhm-ud2a-nugz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48489?format=json","vulnerability_id":"VCID-hzy4-16j5-8qcf","summary":"Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2031.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2031.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-2031","reference_id":"","reference_type":"","scores":[{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55424","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55385","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55363","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55414","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55403","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55384","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.5542","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57525","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57544","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57524","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00422","scoring_system":"epss","scoring_elements":"0.62033","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-2031"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449","reference_id":"1016449","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2094789","reference_id":"2094789","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2094789"},{"reference_url":"https://security.archlinux.org/AVG-2782","reference_id":"AVG-2782","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2782"},{"reference_url":"https://security.gentoo.org/glsa/202309-06","reference_id":"GLSA-202309-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202309-06"},{"reference_url":"https://usn.ubuntu.com/5542-1/","reference_id":"USN-5542-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5542-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994567?format=json","purl":"pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-18xs-py1v-xfey"},{"vulnerability":"VCID-28rq-1d68-4bfz"},{"vulnerability":"VCID-2w26-yjmn-k7an"},{"vulnerability":"VCID-3du2-evy8-jfa1"},{"vulnerability":"VCID-5cd3-497h-qkhw"},{"vulnerability":"VCID-68zz-z589-87f6"},{"vulnerability":"VCID-6mju-nwzy-pqeq"},{"vulnerability":"VCID-745n-wca7-d7fh"},{"vulnerability":"VCID-7xdg-sn88-bkbs"},{"vulnerability":"VCID-84q8-2457-qkc5"},{"vulnerability":"VCID-94k8-98me-x3dw"},{"vulnerability":"VCID-apqw-e2px-yka5"},{"vulnerability":"VCID-b4ty-d775-5fed"},{"vulnerability":"VCID-bc1t-hzu5-bffd"},{"vulnerability":"VCID-bpht-9daq-rfgd"},{"vulnerability":"VCID-fskg-j9fe-6yeg"},{"vulnerability":"VCID-hfsk-4cbd-m3b1"},{"vulnerability":"VCID-kkwp-2x9m-9bgd"},{"vulnerability":"VCID-q2d9-vahb-6qce"},{"vulnerability":"VCID-r7va-6j6s-rba5"},{"vulnerability":"VCID-w4c6-p858-rkaw"},{"vulnerability":"VCID-wxva-f9ay-c3a2"},{"vulnerability":"VCID-xmn1-g72k-8qcq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"}],"aliases":["CVE-2022-2031"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hzy4-16j5-8qcf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48486?format=json","vulnerability_id":"VCID-m44e-rw2w-vuhj","summary":"Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0336.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0336.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-0336","reference_id":"","reference_type":"","scores":[{"value":"0.00382","scoring_system":"epss","scoring_elements":"0.59459","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00382","scoring_system":"epss","scoring_elements":"0.59573","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00382","scoring_system":"epss","scoring_elements":"0.59567","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00382","scoring_system":"epss","scoring_elements":"0.59587","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00382","scoring_system":"epss","scoring_elements":"0.59531","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00382","scoring_system":"epss","scoring_elements":"0.59556","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00382","scoring_system":"epss","scoring_elements":"0.59525","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00382","scoring_system":"epss","scoring_elements":"0.59576","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00382","scoring_system":"epss","scoring_elements":"0.59589","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00382","scoring_system":"epss","scoring_elements":"0.59607","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00382","scoring_system":"epss","scoring_elements":"0.59591","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00382","scoring_system":"epss","scoring_elements":"0.59571","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00382","scoring_system":"epss","scoring_elements":"0.59604","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00382","scoring_system":"epss","scoring_elements":"0.59611","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00382","scoring_system":"epss","scoring_elements":"0.59595","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-0336"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0336","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0336"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004694","reference_id":"1004694","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004694"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2046134","reference_id":"2046134","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2046134"},{"reference_url":"https://security.archlinux.org/AVG-2648","reference_id":"AVG-2648","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2648"},{"reference_url":"https://security.gentoo.org/glsa/202309-06","reference_id":"GLSA-202309-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202309-06"},{"reference_url":"https://usn.ubuntu.com/5260-1/","reference_id":"USN-5260-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5260-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994567?format=json","purl":"pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-18xs-py1v-xfey"},{"vulnerability":"VCID-28rq-1d68-4bfz"},{"vulnerability":"VCID-2w26-yjmn-k7an"},{"vulnerability":"VCID-3du2-evy8-jfa1"},{"vulnerability":"VCID-5cd3-497h-qkhw"},{"vulnerability":"VCID-68zz-z589-87f6"},{"vulnerability":"VCID-6mju-nwzy-pqeq"},{"vulnerability":"VCID-745n-wca7-d7fh"},{"vulnerability":"VCID-7xdg-sn88-bkbs"},{"vulnerability":"VCID-84q8-2457-qkc5"},{"vulnerability":"VCID-94k8-98me-x3dw"},{"vulnerability":"VCID-apqw-e2px-yka5"},{"vulnerability":"VCID-b4ty-d775-5fed"},{"vulnerability":"VCID-bc1t-hzu5-bffd"},{"vulnerability":"VCID-bpht-9daq-rfgd"},{"vulnerability":"VCID-fskg-j9fe-6yeg"},{"vulnerability":"VCID-hfsk-4cbd-m3b1"},{"vulnerability":"VCID-kkwp-2x9m-9bgd"},{"vulnerability":"VCID-q2d9-vahb-6qce"},{"vulnerability":"VCID-r7va-6j6s-rba5"},{"vulnerability":"VCID-w4c6-p858-rkaw"},{"vulnerability":"VCID-wxva-f9ay-c3a2"},{"vulnerability":"VCID-xmn1-g72k-8qcq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"}],"aliases":["CVE-2022-0336"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m44e-rw2w-vuhj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81894?format=json","vulnerability_id":"VCID-mgaq-qjdw-fke4","summary":"samba: AD DC check password script does not receive full password when non-ASCII characters are used","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14833.json","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14833.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-14833","reference_id":"","reference_type":"","scores":[{"value":"0.01267","scoring_system":"epss","scoring_elements":"0.79414","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01267","scoring_system":"epss","scoring_elements":"0.79549","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01267","scoring_system":"epss","scoring_elements":"0.79463","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01267","scoring_system":"epss","scoring_elements":"0.79494","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01267","scoring_system":"epss","scoring_elements":"0.79496","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01267","scoring_system":"epss","scoring_elements":"0.79527","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01267","scoring_system":"epss","scoring_elements":"0.79533","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01267","scoring_system":"epss","scoring_elements":"0.79421","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01267","scoring_system":"epss","scoring_elements":"0.79444","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01267","scoring_system":"epss","scoring_elements":"0.7943","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01267","scoring_system":"epss","scoring_elements":"0.79459","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01267","scoring_system":"epss","scoring_elements":"0.79469","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01267","scoring_system":"epss","scoring_elements":"0.79491","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01267","scoring_system":"epss","scoring_elements":"0.79473","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-14833"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14833","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14833"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14833","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14833"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKPYHDFI7HRELVXBE5J4MTGSI35AKFBI/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKPYHDFI7HRELVXBE5J4MTGSI35AKFBI/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UMIYCYXCPRTVCVZ3TP6ZGPJ6RZS3IX4G/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UMIYCYXCPRTVCVZ3TP6ZGPJ6RZS3IX4G/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3IUACPZJXSC4OM6P2V4IC4QMZQZWPD/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3IUACPZJXSC4OM6P2V4IC4QMZQZWPD/"},{"reference_url":"https://www.samba.org/samba/security/CVE-2019-14833.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.samba.org/samba/security/CVE-2019-14833.html"},{"reference_url":"https://www.synology.com/security/advisory/Synology_SA_19_35","reference_id":"","reference_type":"","scores":[],"url":"https://www.synology.com/security/advisory/Synology_SA_19_35"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1764126","reference_id":"1764126","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1764126"},{"reference_url":"https://security.archlinux.org/ASA-201911-6","reference_id":"ASA-201911-6","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201911-6"},{"reference_url":"https://security.archlinux.org/AVG-1057","reference_id":"AVG-1057","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1057"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-14833","reference_id":"CVE-2019-14833","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:P/I:P/A:N"},{"value":"4.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"},{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-14833"},{"reference_url":"https://usn.ubuntu.com/4167-1/","reference_id":"USN-4167-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4167-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994567?format=json","purl":"pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-18xs-py1v-xfey"},{"vulnerability":"VCID-28rq-1d68-4bfz"},{"vulnerability":"VCID-2w26-yjmn-k7an"},{"vulnerability":"VCID-3du2-evy8-jfa1"},{"vulnerability":"VCID-5cd3-497h-qkhw"},{"vulnerability":"VCID-68zz-z589-87f6"},{"vulnerability":"VCID-6mju-nwzy-pqeq"},{"vulnerability":"VCID-745n-wca7-d7fh"},{"vulnerability":"VCID-7xdg-sn88-bkbs"},{"vulnerability":"VCID-84q8-2457-qkc5"},{"vulnerability":"VCID-94k8-98me-x3dw"},{"vulnerability":"VCID-apqw-e2px-yka5"},{"vulnerability":"VCID-b4ty-d775-5fed"},{"vulnerability":"VCID-bc1t-hzu5-bffd"},{"vulnerability":"VCID-bpht-9daq-rfgd"},{"vulnerability":"VCID-fskg-j9fe-6yeg"},{"vulnerability":"VCID-hfsk-4cbd-m3b1"},{"vulnerability":"VCID-kkwp-2x9m-9bgd"},{"vulnerability":"VCID-q2d9-vahb-6qce"},{"vulnerability":"VCID-r7va-6j6s-rba5"},{"vulnerability":"VCID-w4c6-p858-rkaw"},{"vulnerability":"VCID-wxva-f9ay-c3a2"},{"vulnerability":"VCID-xmn1-g72k-8qcq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"}],"aliases":["CVE-2019-14833"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mgaq-qjdw-fke4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48477?format=json","vulnerability_id":"VCID-mw6j-fkm4-pkg2","summary":"Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25721.json","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25721.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25721","reference_id":"","reference_type":"","scores":[{"value":"0.00367","scoring_system":"epss","scoring_elements":"0.58562","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00367","scoring_system":"epss","scoring_elements":"0.58652","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00367","scoring_system":"epss","scoring_elements":"0.58707","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00367","scoring_system":"epss","scoring_elements":"0.58653","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00367","scoring_system":"epss","scoring_elements":"0.58646","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00367","scoring_system":"epss","scoring_elements":"0.58667","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00367","scoring_system":"epss","scoring_elements":"0.58633","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00367","scoring_system":"epss","scoring_elements":"0.58685","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00367","scoring_system":"epss","scoring_elements":"0.58691","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00367","scoring_system":"epss","scoring_elements":"0.58709","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00367","scoring_system":"epss","scoring_elements":"0.5869","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00367","scoring_system":"epss","scoring_elements":"0.5867","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00367","scoring_system":"epss","scoring_elements":"0.58703","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2021728","reference_id":"2021728","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2021728"},{"reference_url":"https://security.archlinux.org/AVG-2538","reference_id":"AVG-2538","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2538"},{"reference_url":"https://security.gentoo.org/glsa/202309-06","reference_id":"GLSA-202309-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202309-06"},{"reference_url":"https://usn.ubuntu.com/5142-1/","reference_id":"USN-5142-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5142-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994567?format=json","purl":"pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-18xs-py1v-xfey"},{"vulnerability":"VCID-28rq-1d68-4bfz"},{"vulnerability":"VCID-2w26-yjmn-k7an"},{"vulnerability":"VCID-3du2-evy8-jfa1"},{"vulnerability":"VCID-5cd3-497h-qkhw"},{"vulnerability":"VCID-68zz-z589-87f6"},{"vulnerability":"VCID-6mju-nwzy-pqeq"},{"vulnerability":"VCID-745n-wca7-d7fh"},{"vulnerability":"VCID-7xdg-sn88-bkbs"},{"vulnerability":"VCID-84q8-2457-qkc5"},{"vulnerability":"VCID-94k8-98me-x3dw"},{"vulnerability":"VCID-apqw-e2px-yka5"},{"vulnerability":"VCID-b4ty-d775-5fed"},{"vulnerability":"VCID-bc1t-hzu5-bffd"},{"vulnerability":"VCID-bpht-9daq-rfgd"},{"vulnerability":"VCID-fskg-j9fe-6yeg"},{"vulnerability":"VCID-hfsk-4cbd-m3b1"},{"vulnerability":"VCID-kkwp-2x9m-9bgd"},{"vulnerability":"VCID-q2d9-vahb-6qce"},{"vulnerability":"VCID-r7va-6j6s-rba5"},{"vulnerability":"VCID-w4c6-p858-rkaw"},{"vulnerability":"VCID-wxva-f9ay-c3a2"},{"vulnerability":"VCID-xmn1-g72k-8qcq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"}],"aliases":["CVE-2020-25721"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mw6j-fkm4-pkg2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46962?format=json","vulnerability_id":"VCID-p1se-92ae-t3b5","summary":"Multiple vulnerabilities have been discovered in Samba, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2127.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2127.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-2127","reference_id":"","reference_type":"","scores":[{"value":"0.0115","scoring_system":"epss","scoring_elements":"0.78563","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0115","scoring_system":"epss","scoring_elements":"0.78507","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0115","scoring_system":"epss","scoring_elements":"0.7854","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0115","scoring_system":"epss","scoring_elements":"0.78547","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01247","scoring_system":"epss","scoring_elements":"0.79329","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01247","scoring_system":"epss","scoring_elements":"0.79265","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01247","scoring_system":"epss","scoring_elements":"0.79288","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01247","scoring_system":"epss","scoring_elements":"0.79274","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01247","scoring_system":"epss","scoring_elements":"0.793","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01247","scoring_system":"epss","scoring_elements":"0.79309","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01247","scoring_system":"epss","scoring_elements":"0.79333","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01247","scoring_system":"epss","scoring_elements":"0.79317","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01247","scoring_system":"epss","scoring_elements":"0.79306","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-2127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2222791","reference_id":"2222791","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T15:21:45Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2222791"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::resilientstorage","reference_id":"cpe:/a:redhat:enterprise_linux:9::resilientstorage","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::resilientstorage"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb","reference_id":"cpe:/a:redhat:rhel_eus:8.6::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb","reference_id":"cpe:/a:redhat:rhel_eus:8.8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:storage:3","reference_id":"cpe:/a:redhat:storage:3","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:storage:3"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos","reference_id":"cpe:/o:redhat:enterprise_linux:8::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos","reference_id":"cpe:/o:redhat:enterprise_linux:9::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos","reference_id":"cpe:/o:redhat:rhel_eus:8.6::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos","reference_id":"cpe:/o:redhat:rhel_eus:8.8::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8","reference_id":"cpe:/o:redhat:rhev_hypervisor:4.4::el8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2022-2127","reference_id":"CVE-2022-2127","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T15:21:45Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2022-2127"},{"reference_url":"https://www.samba.org/samba/security/CVE-2022-2127.html","reference_id":"CVE-2022-2127.html","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T15:21:45Z/"}],"url":"https://www.samba.org/samba/security/CVE-2022-2127.html"},{"reference_url":"https://security.gentoo.org/glsa/202402-28","reference_id":"GLSA-202402-28","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-28"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6667","reference_id":"RHSA-2023:6667","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T15:21:45Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:6667"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7139","reference_id":"RHSA-2023:7139","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T15:21:45Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7139"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0423","reference_id":"RHSA-2024:0423","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T15:21:45Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0580","reference_id":"RHSA-2024:0580","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T15:21:45Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0580"},{"reference_url":"https://usn.ubuntu.com/6238-1/","reference_id":"USN-6238-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6238-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994567?format=json","purl":"pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-18xs-py1v-xfey"},{"vulnerability":"VCID-28rq-1d68-4bfz"},{"vulnerability":"VCID-2w26-yjmn-k7an"},{"vulnerability":"VCID-3du2-evy8-jfa1"},{"vulnerability":"VCID-5cd3-497h-qkhw"},{"vulnerability":"VCID-68zz-z589-87f6"},{"vulnerability":"VCID-6mju-nwzy-pqeq"},{"vulnerability":"VCID-745n-wca7-d7fh"},{"vulnerability":"VCID-7xdg-sn88-bkbs"},{"vulnerability":"VCID-84q8-2457-qkc5"},{"vulnerability":"VCID-94k8-98me-x3dw"},{"vulnerability":"VCID-apqw-e2px-yka5"},{"vulnerability":"VCID-b4ty-d775-5fed"},{"vulnerability":"VCID-bc1t-hzu5-bffd"},{"vulnerability":"VCID-bpht-9daq-rfgd"},{"vulnerability":"VCID-fskg-j9fe-6yeg"},{"vulnerability":"VCID-hfsk-4cbd-m3b1"},{"vulnerability":"VCID-kkwp-2x9m-9bgd"},{"vulnerability":"VCID-q2d9-vahb-6qce"},{"vulnerability":"VCID-r7va-6j6s-rba5"},{"vulnerability":"VCID-w4c6-p858-rkaw"},{"vulnerability":"VCID-wxva-f9ay-c3a2"},{"vulnerability":"VCID-xmn1-g72k-8qcq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"}],"aliases":["CVE-2022-2127"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p1se-92ae-t3b5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47169?format=json","vulnerability_id":"VCID-qt4e-73xg-bqde","summary":"Multiple vulnerabilities have been found in Samba, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14318.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14318.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14318","reference_id":"","reference_type":"","scores":[{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36453","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36629","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36143","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36569","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36576","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36541","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36517","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36561","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36543","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36488","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.3626","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.3623","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36661","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36498","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.3655","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14318"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14318","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14318"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1892631","reference_id":"1892631","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T14:56:23Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1892631"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973400","reference_id":"973400","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973400"},{"reference_url":"https://www.samba.org/samba/security/CVE-2020-14318.html","reference_id":"CVE-2020-14318.html","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T14:56:23Z/"}],"url":"https://www.samba.org/samba/security/CVE-2020-14318.html"},{"reference_url":"https://security.gentoo.org/glsa/202012-24","reference_id":"GLSA-202012-24","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T14:56:23Z/"}],"url":"https://security.gentoo.org/glsa/202012-24"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html","reference_id":"msg00015.html","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T14:56:23Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5439","reference_id":"RHSA-2020:5439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1647","reference_id":"RHSA-2021:1647","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1647"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3723","reference_id":"RHSA-2021:3723","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3723"},{"reference_url":"https://usn.ubuntu.com/4611-1/","reference_id":"USN-4611-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4611-1/"},{"reference_url":"https://usn.ubuntu.com/4931-1/","reference_id":"USN-4931-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4931-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994567?format=json","purl":"pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-18xs-py1v-xfey"},{"vulnerability":"VCID-28rq-1d68-4bfz"},{"vulnerability":"VCID-2w26-yjmn-k7an"},{"vulnerability":"VCID-3du2-evy8-jfa1"},{"vulnerability":"VCID-5cd3-497h-qkhw"},{"vulnerability":"VCID-68zz-z589-87f6"},{"vulnerability":"VCID-6mju-nwzy-pqeq"},{"vulnerability":"VCID-745n-wca7-d7fh"},{"vulnerability":"VCID-7xdg-sn88-bkbs"},{"vulnerability":"VCID-84q8-2457-qkc5"},{"vulnerability":"VCID-94k8-98me-x3dw"},{"vulnerability":"VCID-apqw-e2px-yka5"},{"vulnerability":"VCID-b4ty-d775-5fed"},{"vulnerability":"VCID-bc1t-hzu5-bffd"},{"vulnerability":"VCID-bpht-9daq-rfgd"},{"vulnerability":"VCID-fskg-j9fe-6yeg"},{"vulnerability":"VCID-hfsk-4cbd-m3b1"},{"vulnerability":"VCID-kkwp-2x9m-9bgd"},{"vulnerability":"VCID-q2d9-vahb-6qce"},{"vulnerability":"VCID-r7va-6j6s-rba5"},{"vulnerability":"VCID-w4c6-p858-rkaw"},{"vulnerability":"VCID-wxva-f9ay-c3a2"},{"vulnerability":"VCID-xmn1-g72k-8qcq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"}],"aliases":["CVE-2020-14318"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qt4e-73xg-bqde"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48497?format=json","vulnerability_id":"VCID-rgu3-rgej-aucp","summary":"Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32745.json","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32745.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32745","reference_id":"","reference_type":"","scores":[{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62238","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62228","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62207","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62253","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.6226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62244","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62185","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62153","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62203","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62221","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00461","scoring_system":"epss","scoring_elements":"0.64207","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00461","scoring_system":"epss","scoring_elements":"0.64221","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00555","scoring_system":"epss","scoring_elements":"0.68055","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449","reference_id":"1016449","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2108211","reference_id":"2108211","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2108211"},{"reference_url":"https://security.archlinux.org/AVG-2782","reference_id":"AVG-2782","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2782"},{"reference_url":"https://security.gentoo.org/glsa/202309-06","reference_id":"GLSA-202309-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202309-06"},{"reference_url":"https://usn.ubuntu.com/5542-1/","reference_id":"USN-5542-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5542-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994567?format=json","purl":"pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-18xs-py1v-xfey"},{"vulnerability":"VCID-28rq-1d68-4bfz"},{"vulnerability":"VCID-2w26-yjmn-k7an"},{"vulnerability":"VCID-3du2-evy8-jfa1"},{"vulnerability":"VCID-5cd3-497h-qkhw"},{"vulnerability":"VCID-68zz-z589-87f6"},{"vulnerability":"VCID-6mju-nwzy-pqeq"},{"vulnerability":"VCID-745n-wca7-d7fh"},{"vulnerability":"VCID-7xdg-sn88-bkbs"},{"vulnerability":"VCID-84q8-2457-qkc5"},{"vulnerability":"VCID-94k8-98me-x3dw"},{"vulnerability":"VCID-apqw-e2px-yka5"},{"vulnerability":"VCID-b4ty-d775-5fed"},{"vulnerability":"VCID-bc1t-hzu5-bffd"},{"vulnerability":"VCID-bpht-9daq-rfgd"},{"vulnerability":"VCID-fskg-j9fe-6yeg"},{"vulnerability":"VCID-hfsk-4cbd-m3b1"},{"vulnerability":"VCID-kkwp-2x9m-9bgd"},{"vulnerability":"VCID-q2d9-vahb-6qce"},{"vulnerability":"VCID-r7va-6j6s-rba5"},{"vulnerability":"VCID-w4c6-p858-rkaw"},{"vulnerability":"VCID-wxva-f9ay-c3a2"},{"vulnerability":"VCID-xmn1-g72k-8qcq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"}],"aliases":["CVE-2022-32745"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rgu3-rgej-aucp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46967?format=json","vulnerability_id":"VCID-rnfg-1cgy-jbaq","summary":"Multiple vulnerabilities have been discovered in Samba, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34966.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34966.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-34966","reference_id":"","reference_type":"","scores":[{"value":"0.13565","scoring_system":"epss","scoring_elements":"0.94255","published_at":"2026-04-29T12:55:00Z"},{"value":"0.13565","scoring_system":"epss","scoring_elements":"0.94252","published_at":"2026-04-21T12:55:00Z"},{"value":"0.13565","scoring_system":"epss","scoring_elements":"0.94256","published_at":"2026-04-24T12:55:00Z"},{"value":"0.15899","scoring_system":"epss","scoring_elements":"0.94729","published_at":"2026-04-04T12:55:00Z"},{"value":"0.15899","scoring_system":"epss","scoring_elements":"0.9474","published_at":"2026-04-08T12:55:00Z"},{"value":"0.15899","scoring_system":"epss","scoring_elements":"0.94744","published_at":"2026-04-09T12:55:00Z"},{"value":"0.15899","scoring_system":"epss","scoring_elements":"0.94748","published_at":"2026-04-11T12:55:00Z"},{"value":"0.15899","scoring_system":"epss","scoring_elements":"0.94752","published_at":"2026-04-13T12:55:00Z"},{"value":"0.15899","scoring_system":"epss","scoring_elements":"0.94761","published_at":"2026-04-16T12:55:00Z"},{"value":"0.15899","scoring_system":"epss","scoring_elements":"0.94764","published_at":"2026-04-18T12:55:00Z"},{"value":"0.15899","scoring_system":"epss","scoring_elements":"0.9473","published_at":"2026-04-07T12:55:00Z"},{"value":"0.15899","scoring_system":"epss","scoring_elements":"0.94725","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-34966"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2222793","reference_id":"2222793","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2222793"},{"reference_url":"https://security.gentoo.org/glsa/202402-28","reference_id":"GLSA-202402-28","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-28"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6667","reference_id":"RHSA-2023:6667","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6667"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7139","reference_id":"RHSA-2023:7139","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7139"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0423","reference_id":"RHSA-2024:0423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0580","reference_id":"RHSA-2024:0580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4101","reference_id":"RHSA-2024:4101","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4101"},{"reference_url":"https://usn.ubuntu.com/6238-1/","reference_id":"USN-6238-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6238-1/"},{"reference_url":"https://usn.ubuntu.com/7582-1/","reference_id":"USN-7582-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7582-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994567?format=json","purl":"pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-18xs-py1v-xfey"},{"vulnerability":"VCID-28rq-1d68-4bfz"},{"vulnerability":"VCID-2w26-yjmn-k7an"},{"vulnerability":"VCID-3du2-evy8-jfa1"},{"vulnerability":"VCID-5cd3-497h-qkhw"},{"vulnerability":"VCID-68zz-z589-87f6"},{"vulnerability":"VCID-6mju-nwzy-pqeq"},{"vulnerability":"VCID-745n-wca7-d7fh"},{"vulnerability":"VCID-7xdg-sn88-bkbs"},{"vulnerability":"VCID-84q8-2457-qkc5"},{"vulnerability":"VCID-94k8-98me-x3dw"},{"vulnerability":"VCID-apqw-e2px-yka5"},{"vulnerability":"VCID-b4ty-d775-5fed"},{"vulnerability":"VCID-bc1t-hzu5-bffd"},{"vulnerability":"VCID-bpht-9daq-rfgd"},{"vulnerability":"VCID-fskg-j9fe-6yeg"},{"vulnerability":"VCID-hfsk-4cbd-m3b1"},{"vulnerability":"VCID-kkwp-2x9m-9bgd"},{"vulnerability":"VCID-q2d9-vahb-6qce"},{"vulnerability":"VCID-r7va-6j6s-rba5"},{"vulnerability":"VCID-w4c6-p858-rkaw"},{"vulnerability":"VCID-wxva-f9ay-c3a2"},{"vulnerability":"VCID-xmn1-g72k-8qcq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"}],"aliases":["CVE-2023-34966"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rnfg-1cgy-jbaq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/44835?format=json","vulnerability_id":"VCID-rphh-hzna-nbgf","summary":"Multiple vulnerabilities have been found in Samba, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10760.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10760.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-10760","reference_id":"","reference_type":"","scores":[{"value":"0.02353","scoring_system":"epss","scoring_elements":"0.84829","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02353","scoring_system":"epss","scoring_elements":"0.84958","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02353","scoring_system":"epss","scoring_elements":"0.84951","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02353","scoring_system":"epss","scoring_elements":"0.84959","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02353","scoring_system":"epss","scoring_elements":"0.84845","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02353","scoring_system":"epss","scoring_elements":"0.84863","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02353","scoring_system":"epss","scoring_elements":"0.84864","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02353","scoring_system":"epss","scoring_elements":"0.84887","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02353","scoring_system":"epss","scoring_elements":"0.84894","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02353","scoring_system":"epss","scoring_elements":"0.84913","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02353","scoring_system":"epss","scoring_elements":"0.84911","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02353","scoring_system":"epss","scoring_elements":"0.84905","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02353","scoring_system":"epss","scoring_elements":"0.84927","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02353","scoring_system":"epss","scoring_elements":"0.84928","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02353","scoring_system":"epss","scoring_elements":"0.84926","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-10760"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10760","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10760"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1849509","reference_id":"1849509","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1849509"},{"reference_url":"https://security.archlinux.org/AVG-1202","reference_id":"AVG-1202","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1202"},{"reference_url":"https://security.gentoo.org/glsa/202007-15","reference_id":"GLSA-202007-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-15"},{"reference_url":"https://usn.ubuntu.com/4409-1/","reference_id":"USN-4409-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4409-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994567?format=json","purl":"pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-18xs-py1v-xfey"},{"vulnerability":"VCID-28rq-1d68-4bfz"},{"vulnerability":"VCID-2w26-yjmn-k7an"},{"vulnerability":"VCID-3du2-evy8-jfa1"},{"vulnerability":"VCID-5cd3-497h-qkhw"},{"vulnerability":"VCID-68zz-z589-87f6"},{"vulnerability":"VCID-6mju-nwzy-pqeq"},{"vulnerability":"VCID-745n-wca7-d7fh"},{"vulnerability":"VCID-7xdg-sn88-bkbs"},{"vulnerability":"VCID-84q8-2457-qkc5"},{"vulnerability":"VCID-94k8-98me-x3dw"},{"vulnerability":"VCID-apqw-e2px-yka5"},{"vulnerability":"VCID-b4ty-d775-5fed"},{"vulnerability":"VCID-bc1t-hzu5-bffd"},{"vulnerability":"VCID-bpht-9daq-rfgd"},{"vulnerability":"VCID-fskg-j9fe-6yeg"},{"vulnerability":"VCID-hfsk-4cbd-m3b1"},{"vulnerability":"VCID-kkwp-2x9m-9bgd"},{"vulnerability":"VCID-q2d9-vahb-6qce"},{"vulnerability":"VCID-r7va-6j6s-rba5"},{"vulnerability":"VCID-w4c6-p858-rkaw"},{"vulnerability":"VCID-wxva-f9ay-c3a2"},{"vulnerability":"VCID-xmn1-g72k-8qcq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"}],"aliases":["CVE-2020-10760"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rphh-hzna-nbgf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48490?format=json","vulnerability_id":"VCID-s2ne-rcp3-nbgz","summary":"Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3437.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3437.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3437","reference_id":"","reference_type":"","scores":[{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72659","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72529","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72545","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72522","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.7256","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72572","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72596","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72579","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72568","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.7261","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72621","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72612","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72654","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72663","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3437"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/02/08/1","reference_id":"1","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/02/08/1"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187","reference_id":"1024187","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2137774","reference_id":"2137774","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2137774"},{"reference_url":"https://security.archlinux.org/AVG-2828","reference_id":"AVG-2828","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2828"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2022-3437","reference_id":"CVE-2022-3437","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2022-3437"},{"reference_url":"https://www.samba.org/samba/security/CVE-2022-3437.html","reference_id":"CVE-2022-3437.html","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/"}],"url":"https://www.samba.org/samba/security/CVE-2022-3437.html"},{"reference_url":"https://security.gentoo.org/glsa/202309-06","reference_id":"GLSA-202309-06","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/"}],"url":"https://security.gentoo.org/glsa/202309-06"},{"reference_url":"https://security.gentoo.org/glsa/202310-06","reference_id":"GLSA-202310-06","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/"}],"url":"https://security.gentoo.org/glsa/202310-06"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html","reference_id":"msg00015.html","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230216-0008/","reference_id":"ntap-20230216-0008","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230216-0008/"},{"reference_url":"https://usn.ubuntu.com/5800-1/","reference_id":"USN-5800-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5800-1/"},{"reference_url":"https://usn.ubuntu.com/5822-1/","reference_id":"USN-5822-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5822-1/"},{"reference_url":"https://usn.ubuntu.com/5936-1/","reference_id":"USN-5936-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5936-1/"},{"reference_url":"https://usn.ubuntu.com/7582-1/","reference_id":"USN-7582-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7582-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994567?format=json","purl":"pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-18xs-py1v-xfey"},{"vulnerability":"VCID-28rq-1d68-4bfz"},{"vulnerability":"VCID-2w26-yjmn-k7an"},{"vulnerability":"VCID-3du2-evy8-jfa1"},{"vulnerability":"VCID-5cd3-497h-qkhw"},{"vulnerability":"VCID-68zz-z589-87f6"},{"vulnerability":"VCID-6mju-nwzy-pqeq"},{"vulnerability":"VCID-745n-wca7-d7fh"},{"vulnerability":"VCID-7xdg-sn88-bkbs"},{"vulnerability":"VCID-84q8-2457-qkc5"},{"vulnerability":"VCID-94k8-98me-x3dw"},{"vulnerability":"VCID-apqw-e2px-yka5"},{"vulnerability":"VCID-b4ty-d775-5fed"},{"vulnerability":"VCID-bc1t-hzu5-bffd"},{"vulnerability":"VCID-bpht-9daq-rfgd"},{"vulnerability":"VCID-fskg-j9fe-6yeg"},{"vulnerability":"VCID-hfsk-4cbd-m3b1"},{"vulnerability":"VCID-kkwp-2x9m-9bgd"},{"vulnerability":"VCID-q2d9-vahb-6qce"},{"vulnerability":"VCID-r7va-6j6s-rba5"},{"vulnerability":"VCID-w4c6-p858-rkaw"},{"vulnerability":"VCID-wxva-f9ay-c3a2"},{"vulnerability":"VCID-xmn1-g72k-8qcq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"}],"aliases":["CVE-2022-3437"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s2ne-rcp3-nbgz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81893?format=json","vulnerability_id":"VCID-s6ma-9h2y-hyc4","summary":"samba: smb client vulnerable to filenames containing path separators","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10218.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10218.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10218","reference_id":"","reference_type":"","scores":[{"value":"0.04508","scoring_system":"epss","scoring_elements":"0.89084","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04508","scoring_system":"epss","scoring_elements":"0.89175","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04508","scoring_system":"epss","scoring_elements":"0.89138","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04508","scoring_system":"epss","scoring_elements":"0.89151","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04508","scoring_system":"epss","scoring_elements":"0.89148","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04508","scoring_system":"epss","scoring_elements":"0.89165","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04508","scoring_system":"epss","scoring_elements":"0.8917","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04508","scoring_system":"epss","scoring_elements":"0.89093","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04508","scoring_system":"epss","scoring_elements":"0.89107","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04508","scoring_system":"epss","scoring_elements":"0.8911","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04508","scoring_system":"epss","scoring_elements":"0.89128","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04508","scoring_system":"epss","scoring_elements":"0.89133","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04508","scoring_system":"epss","scoring_elements":"0.89144","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04508","scoring_system":"epss","scoring_elements":"0.8914","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10218"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10218","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10218"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10218","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10218"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKPYHDFI7HRELVXBE5J4MTGSI35AKFBI/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKPYHDFI7HRELVXBE5J4MTGSI35AKFBI/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UMIYCYXCPRTVCVZ3TP6ZGPJ6RZS3IX4G/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UMIYCYXCPRTVCVZ3TP6ZGPJ6RZS3IX4G/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3IUACPZJXSC4OM6P2V4IC4QMZQZWPD/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3IUACPZJXSC4OM6P2V4IC4QMZQZWPD/"},{"reference_url":"https://www.samba.org/samba/security/CVE-2019-10218.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.samba.org/samba/security/CVE-2019-10218.html"},{"reference_url":"https://www.synology.com/security/advisory/Synology_SA_19_35","reference_id":"","reference_type":"","scores":[],"url":"https://www.synology.com/security/advisory/Synology_SA_19_35"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1763137","reference_id":"1763137","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1763137"},{"reference_url":"https://security.archlinux.org/ASA-201911-6","reference_id":"ASA-201911-6","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201911-6"},{"reference_url":"https://security.archlinux.org/AVG-1057","reference_id":"AVG-1057","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1057"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10218","reference_id":"CVE-2019-10218","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10218"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0943","reference_id":"RHSA-2020:0943","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0943"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1084","reference_id":"RHSA-2020:1084","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1084"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1878","reference_id":"RHSA-2020:1878","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1878"},{"reference_url":"https://usn.ubuntu.com/4167-1/","reference_id":"USN-4167-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4167-1/"},{"reference_url":"https://usn.ubuntu.com/4167-2/","reference_id":"USN-4167-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4167-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994567?format=json","purl":"pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-18xs-py1v-xfey"},{"vulnerability":"VCID-28rq-1d68-4bfz"},{"vulnerability":"VCID-2w26-yjmn-k7an"},{"vulnerability":"VCID-3du2-evy8-jfa1"},{"vulnerability":"VCID-5cd3-497h-qkhw"},{"vulnerability":"VCID-68zz-z589-87f6"},{"vulnerability":"VCID-6mju-nwzy-pqeq"},{"vulnerability":"VCID-745n-wca7-d7fh"},{"vulnerability":"VCID-7xdg-sn88-bkbs"},{"vulnerability":"VCID-84q8-2457-qkc5"},{"vulnerability":"VCID-94k8-98me-x3dw"},{"vulnerability":"VCID-apqw-e2px-yka5"},{"vulnerability":"VCID-b4ty-d775-5fed"},{"vulnerability":"VCID-bc1t-hzu5-bffd"},{"vulnerability":"VCID-bpht-9daq-rfgd"},{"vulnerability":"VCID-fskg-j9fe-6yeg"},{"vulnerability":"VCID-hfsk-4cbd-m3b1"},{"vulnerability":"VCID-kkwp-2x9m-9bgd"},{"vulnerability":"VCID-q2d9-vahb-6qce"},{"vulnerability":"VCID-r7va-6j6s-rba5"},{"vulnerability":"VCID-w4c6-p858-rkaw"},{"vulnerability":"VCID-wxva-f9ay-c3a2"},{"vulnerability":"VCID-xmn1-g72k-8qcq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"}],"aliases":["CVE-2019-10218"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s6ma-9h2y-hyc4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46965?format=json","vulnerability_id":"VCID-smxs-4de1-nfec","summary":"Multiple vulnerabilities have been discovered in Samba, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4091.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4091.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4091","reference_id":"","reference_type":"","scores":[{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63181","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63147","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63169","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63183","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64884","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64921","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.6485","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64931","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64877","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.6484","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.6489","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64905","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64922","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64912","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4091"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2241882","reference_id":"2241882","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T16:18:12Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2241882"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::resilientstorage","reference_id":"cpe:/a:redhat:enterprise_linux:9::resilientstorage","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::resilientstorage"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb","reference_id":"cpe:/a:redhat:rhel_eus:8.6::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb","reference_id":"cpe:/a:redhat:rhel_eus:8.8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb","reference_id":"cpe:/a:redhat:rhel_eus:9.0::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::resilientstorage","reference_id":"cpe:/a:redhat:rhel_eus:9.0::resilientstorage","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::resilientstorage"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb","reference_id":"cpe:/a:redhat:rhel_eus:9.2::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::resilientstorage","reference_id":"cpe:/a:redhat:rhel_eus:9.2::resilientstorage","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::resilientstorage"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:storage:3","reference_id":"cpe:/a:redhat:storage:3","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:storage:3"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos","reference_id":"cpe:/o:redhat:enterprise_linux:8::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos","reference_id":"cpe:/o:redhat:enterprise_linux:9::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos","reference_id":"cpe:/o:redhat:rhel_eus:8.6::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos","reference_id":"cpe:/o:redhat:rhel_eus:8.8::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.0::baseos","reference_id":"cpe:/o:redhat:rhel_eus:9.0::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.0::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos","reference_id":"cpe:/o:redhat:rhel_eus:9.2::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8","reference_id":"cpe:/o:redhat:rhev_hypervisor:4.4::el8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-4091","reference_id":"CVE-2023-4091","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T16:18:12Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2023-4091"},{"reference_url":"https://www.samba.org/samba/security/CVE-2023-4091.html","reference_id":"CVE-2023-4091.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T16:18:12Z/"}],"url":"https://www.samba.org/samba/security/CVE-2023-4091.html"},{"reference_url":"https://security.gentoo.org/glsa/202402-28","reference_id":"GLSA-202402-28","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-28"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6209","reference_id":"RHSA-2023:6209","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T16:18:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:6209"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6744","reference_id":"RHSA-2023:6744","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T16:18:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:6744"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7371","reference_id":"RHSA-2023:7371","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T16:18:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7371"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7408","reference_id":"RHSA-2023:7408","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T16:18:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7408"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7464","reference_id":"RHSA-2023:7464","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T16:18:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7464"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7467","reference_id":"RHSA-2023:7467","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T16:18:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7467"},{"reference_url":"https://bugzilla.samba.org/show_bug.cgi?id=15439","reference_id":"show_bug.cgi?id=15439","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T16:18:12Z/"}],"url":"https://bugzilla.samba.org/show_bug.cgi?id=15439"},{"reference_url":"https://usn.ubuntu.com/6425-1/","reference_id":"USN-6425-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6425-1/"},{"reference_url":"https://usn.ubuntu.com/6425-3/","reference_id":"USN-6425-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6425-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994567?format=json","purl":"pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-18xs-py1v-xfey"},{"vulnerability":"VCID-28rq-1d68-4bfz"},{"vulnerability":"VCID-2w26-yjmn-k7an"},{"vulnerability":"VCID-3du2-evy8-jfa1"},{"vulnerability":"VCID-5cd3-497h-qkhw"},{"vulnerability":"VCID-68zz-z589-87f6"},{"vulnerability":"VCID-6mju-nwzy-pqeq"},{"vulnerability":"VCID-745n-wca7-d7fh"},{"vulnerability":"VCID-7xdg-sn88-bkbs"},{"vulnerability":"VCID-84q8-2457-qkc5"},{"vulnerability":"VCID-94k8-98me-x3dw"},{"vulnerability":"VCID-apqw-e2px-yka5"},{"vulnerability":"VCID-b4ty-d775-5fed"},{"vulnerability":"VCID-bc1t-hzu5-bffd"},{"vulnerability":"VCID-bpht-9daq-rfgd"},{"vulnerability":"VCID-fskg-j9fe-6yeg"},{"vulnerability":"VCID-hfsk-4cbd-m3b1"},{"vulnerability":"VCID-kkwp-2x9m-9bgd"},{"vulnerability":"VCID-q2d9-vahb-6qce"},{"vulnerability":"VCID-r7va-6j6s-rba5"},{"vulnerability":"VCID-w4c6-p858-rkaw"},{"vulnerability":"VCID-wxva-f9ay-c3a2"},{"vulnerability":"VCID-xmn1-g72k-8qcq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"}],"aliases":["CVE-2023-4091"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-smxs-4de1-nfec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48498?format=json","vulnerability_id":"VCID-t3zy-v34p-7uen","summary":"Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32746.json","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32746.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32746","reference_id":"","reference_type":"","scores":[{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53475","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56703","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56678","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56657","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56688","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56687","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56659","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.5666","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56638","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.5669","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56694","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00368","scoring_system":"epss","scoring_elements":"0.58703","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00368","scoring_system":"epss","scoring_elements":"0.58687","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00368","scoring_system":"epss","scoring_elements":"0.58688","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32746"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449","reference_id":"1016449","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2108215","reference_id":"2108215","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2108215"},{"reference_url":"https://security.archlinux.org/AVG-2782","reference_id":"AVG-2782","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2782"},{"reference_url":"https://security.gentoo.org/glsa/202309-06","reference_id":"GLSA-202309-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202309-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7730","reference_id":"RHSA-2022:7730","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7730"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8318","reference_id":"RHSA-2022:8318","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8318"},{"reference_url":"https://usn.ubuntu.com/5542-1/","reference_id":"USN-5542-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5542-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994567?format=json","purl":"pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-18xs-py1v-xfey"},{"vulnerability":"VCID-28rq-1d68-4bfz"},{"vulnerability":"VCID-2w26-yjmn-k7an"},{"vulnerability":"VCID-3du2-evy8-jfa1"},{"vulnerability":"VCID-5cd3-497h-qkhw"},{"vulnerability":"VCID-68zz-z589-87f6"},{"vulnerability":"VCID-6mju-nwzy-pqeq"},{"vulnerability":"VCID-745n-wca7-d7fh"},{"vulnerability":"VCID-7xdg-sn88-bkbs"},{"vulnerability":"VCID-84q8-2457-qkc5"},{"vulnerability":"VCID-94k8-98me-x3dw"},{"vulnerability":"VCID-apqw-e2px-yka5"},{"vulnerability":"VCID-b4ty-d775-5fed"},{"vulnerability":"VCID-bc1t-hzu5-bffd"},{"vulnerability":"VCID-bpht-9daq-rfgd"},{"vulnerability":"VCID-fskg-j9fe-6yeg"},{"vulnerability":"VCID-hfsk-4cbd-m3b1"},{"vulnerability":"VCID-kkwp-2x9m-9bgd"},{"vulnerability":"VCID-q2d9-vahb-6qce"},{"vulnerability":"VCID-r7va-6j6s-rba5"},{"vulnerability":"VCID-w4c6-p858-rkaw"},{"vulnerability":"VCID-wxva-f9ay-c3a2"},{"vulnerability":"VCID-xmn1-g72k-8qcq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"}],"aliases":["CVE-2022-32746"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t3zy-v34p-7uen"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48480?format=json","vulnerability_id":"VCID-tk1x-bex4-8kbz","summary":"Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3738.json","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3738.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3738","reference_id":"","reference_type":"","scores":[{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60803","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60825","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60809","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60797","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60811","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60813","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60826","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60842","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60863","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.6085","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60831","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60873","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60711","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60784","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60777","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3738"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2021726","reference_id":"2021726","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2021726"},{"reference_url":"https://security.archlinux.org/AVG-2538","reference_id":"AVG-2538","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2538"},{"reference_url":"https://security.gentoo.org/glsa/202309-06","reference_id":"GLSA-202309-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202309-06"},{"reference_url":"https://usn.ubuntu.com/5142-1/","reference_id":"USN-5142-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5142-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994567?format=json","purl":"pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-18xs-py1v-xfey"},{"vulnerability":"VCID-28rq-1d68-4bfz"},{"vulnerability":"VCID-2w26-yjmn-k7an"},{"vulnerability":"VCID-3du2-evy8-jfa1"},{"vulnerability":"VCID-5cd3-497h-qkhw"},{"vulnerability":"VCID-68zz-z589-87f6"},{"vulnerability":"VCID-6mju-nwzy-pqeq"},{"vulnerability":"VCID-745n-wca7-d7fh"},{"vulnerability":"VCID-7xdg-sn88-bkbs"},{"vulnerability":"VCID-84q8-2457-qkc5"},{"vulnerability":"VCID-94k8-98me-x3dw"},{"vulnerability":"VCID-apqw-e2px-yka5"},{"vulnerability":"VCID-b4ty-d775-5fed"},{"vulnerability":"VCID-bc1t-hzu5-bffd"},{"vulnerability":"VCID-bpht-9daq-rfgd"},{"vulnerability":"VCID-fskg-j9fe-6yeg"},{"vulnerability":"VCID-hfsk-4cbd-m3b1"},{"vulnerability":"VCID-kkwp-2x9m-9bgd"},{"vulnerability":"VCID-q2d9-vahb-6qce"},{"vulnerability":"VCID-r7va-6j6s-rba5"},{"vulnerability":"VCID-w4c6-p858-rkaw"},{"vulnerability":"VCID-wxva-f9ay-c3a2"},{"vulnerability":"VCID-xmn1-g72k-8qcq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"}],"aliases":["CVE-2021-3738"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tk1x-bex4-8kbz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/44826?format=json","vulnerability_id":"VCID-vg7n-k8px-ayd5","summary":"Multiple vulnerabilities have been found in Samba, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10704.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10704.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-10704","reference_id":"","reference_type":"","scores":[{"value":"0.08887","scoring_system":"epss","scoring_elements":"0.92525","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08887","scoring_system":"epss","scoring_elements":"0.92531","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08887","scoring_system":"epss","scoring_elements":"0.92538","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08887","scoring_system":"epss","scoring_elements":"0.92541","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08887","scoring_system":"epss","scoring_elements":"0.92552","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08887","scoring_system":"epss","scoring_elements":"0.92557","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08887","scoring_system":"epss","scoring_elements":"0.92563","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08887","scoring_system":"epss","scoring_elements":"0.92564","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08887","scoring_system":"epss","scoring_elements":"0.92574","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08887","scoring_system":"epss","scoring_elements":"0.92577","published_at":"2026-04-21T12:55:00Z"},{"value":"0.08887","scoring_system":"epss","scoring_elements":"0.92579","published_at":"2026-04-26T12:55:00Z"},{"value":"0.08887","scoring_system":"epss","scoring_elements":"0.92576","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-10704"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10704","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10704"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1825734","reference_id":"1825734","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1825734"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960188","reference_id":"960188","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960188"},{"reference_url":"https://security.gentoo.org/glsa/202007-15","reference_id":"GLSA-202007-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-15"},{"reference_url":"https://usn.ubuntu.com/4341-1/","reference_id":"USN-4341-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4341-1/"},{"reference_url":"https://usn.ubuntu.com/4341-2/","reference_id":"USN-4341-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4341-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994567?format=json","purl":"pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-18xs-py1v-xfey"},{"vulnerability":"VCID-28rq-1d68-4bfz"},{"vulnerability":"VCID-2w26-yjmn-k7an"},{"vulnerability":"VCID-3du2-evy8-jfa1"},{"vulnerability":"VCID-5cd3-497h-qkhw"},{"vulnerability":"VCID-68zz-z589-87f6"},{"vulnerability":"VCID-6mju-nwzy-pqeq"},{"vulnerability":"VCID-745n-wca7-d7fh"},{"vulnerability":"VCID-7xdg-sn88-bkbs"},{"vulnerability":"VCID-84q8-2457-qkc5"},{"vulnerability":"VCID-94k8-98me-x3dw"},{"vulnerability":"VCID-apqw-e2px-yka5"},{"vulnerability":"VCID-b4ty-d775-5fed"},{"vulnerability":"VCID-bc1t-hzu5-bffd"},{"vulnerability":"VCID-bpht-9daq-rfgd"},{"vulnerability":"VCID-fskg-j9fe-6yeg"},{"vulnerability":"VCID-hfsk-4cbd-m3b1"},{"vulnerability":"VCID-kkwp-2x9m-9bgd"},{"vulnerability":"VCID-q2d9-vahb-6qce"},{"vulnerability":"VCID-r7va-6j6s-rba5"},{"vulnerability":"VCID-w4c6-p858-rkaw"},{"vulnerability":"VCID-wxva-f9ay-c3a2"},{"vulnerability":"VCID-xmn1-g72k-8qcq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"}],"aliases":["CVE-2020-10704"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vg7n-k8px-ayd5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47172?format=json","vulnerability_id":"VCID-vnc5-neuk-m3ar","summary":"Multiple vulnerabilities have been found in Samba, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1472.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1472.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-1472","reference_id":"","reference_type":"","scores":[{"value":"0.9438","scoring_system":"epss","scoring_elements":"0.9997","published_at":"2026-04-29T12:55:00Z"},{"value":"0.9438","scoring_system":"epss","scoring_elements":"0.99969","published_at":"2026-04-18T12:55:00Z"},{"value":"0.9438","scoring_system":"epss","scoring_elements":"0.99968","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-1472"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1472","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1472"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1879822","reference_id":"1879822","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1879822"},{"reference_url":"http://www.openwall.com/lists/oss-security/2020/09/17/2","reference_id":"2","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/"}],"url":"http://www.openwall.com/lists/oss-security/2020/09/17/2"},{"reference_url":"https://www.kb.cert.org/vuls/id/490028","reference_id":"490028","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/"}],"url":"https://www.kb.cert.org/vuls/id/490028"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=971048","reference_id":"971048","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=971048"},{"reference_url":"https://security.archlinux.org/ASA-202009-17","reference_id":"ASA-202009-17","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202009-17"},{"reference_url":"https://security.archlinux.org/AVG-1236","reference_id":"AVG-1236","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1236"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/49071.py","reference_id":"CVE-2020-1472","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/49071.py"},{"reference_url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472","reference_id":"CVE-2020-1472","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/"}],"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472"},{"reference_url":"https://security.gentoo.org/glsa/202012-24","reference_id":"GLSA-202012-24","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/"}],"url":"https://security.gentoo.org/glsa/202012-24"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4OTFBL6YDVFH2TBJFJIE4FMHPJEEJK3/","reference_id":"H4OTFBL6YDVFH2TBJFJIE4FMHPJEEJK3","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4OTFBL6YDVFH2TBJFJIE4FMHPJEEJK3/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html","reference_id":"msg00041.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00080.html","reference_id":"msg00080.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00080.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00086.html","reference_id":"msg00086.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00086.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5439","reference_id":"RHSA-2020:5439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1647","reference_id":"RHSA-2021:1647","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1647"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3723","reference_id":"RHSA-2021:3723","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3723"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ST6X3A2XXYMGD4INR26DQ4FP4QSM753B/","reference_id":"ST6X3A2XXYMGD4INR26DQ4FP4QSM753B","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ST6X3A2XXYMGD4INR26DQ4FP4QSM753B/"},{"reference_url":"https://www.synology.com/security/advisory/Synology_SA_20_21","reference_id":"Synology_SA_20_21","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/"}],"url":"https://www.synology.com/security/advisory/Synology_SA_20_21"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TAPQQZZAT4TG3XVRTAFV2Y3S7OAHFBUP/","reference_id":"TAPQQZZAT4TG3XVRTAFV2Y3S7OAHFBUP","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TAPQQZZAT4TG3XVRTAFV2Y3S7OAHFBUP/"},{"reference_url":"https://usn.ubuntu.com/4510-1/","reference_id":"USN-4510-1","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/"}],"url":"https://usn.ubuntu.com/4510-1/"},{"reference_url":"https://usn.ubuntu.com/4510-2/","reference_id":"USN-4510-2","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/"}],"url":"https://usn.ubuntu.com/4510-2/"},{"reference_url":"https://usn.ubuntu.com/4559-1/","reference_id":"USN-4559-1","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/"}],"url":"https://usn.ubuntu.com/4559-1/"},{"reference_url":"http://packetstormsecurity.com/files/160127/Zerologon-Netlogon-Privilege-Escalation.html","reference_id":"Zerologon-Netlogon-Privilege-Escalation.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/"}],"url":"http://packetstormsecurity.com/files/160127/Zerologon-Netlogon-Privilege-Escalation.html"},{"reference_url":"http://packetstormsecurity.com/files/159190/Zerologon-Proof-Of-Concept.html","reference_id":"Zerologon-Proof-Of-Concept.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-01-30T18:45:11Z/"}],"url":"http://packetstormsecurity.com/files/159190/Zerologon-Proof-Of-Concept.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994567?format=json","purl":"pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-18xs-py1v-xfey"},{"vulnerability":"VCID-28rq-1d68-4bfz"},{"vulnerability":"VCID-2w26-yjmn-k7an"},{"vulnerability":"VCID-3du2-evy8-jfa1"},{"vulnerability":"VCID-5cd3-497h-qkhw"},{"vulnerability":"VCID-68zz-z589-87f6"},{"vulnerability":"VCID-6mju-nwzy-pqeq"},{"vulnerability":"VCID-745n-wca7-d7fh"},{"vulnerability":"VCID-7xdg-sn88-bkbs"},{"vulnerability":"VCID-84q8-2457-qkc5"},{"vulnerability":"VCID-94k8-98me-x3dw"},{"vulnerability":"VCID-apqw-e2px-yka5"},{"vulnerability":"VCID-b4ty-d775-5fed"},{"vulnerability":"VCID-bc1t-hzu5-bffd"},{"vulnerability":"VCID-bpht-9daq-rfgd"},{"vulnerability":"VCID-fskg-j9fe-6yeg"},{"vulnerability":"VCID-hfsk-4cbd-m3b1"},{"vulnerability":"VCID-kkwp-2x9m-9bgd"},{"vulnerability":"VCID-q2d9-vahb-6qce"},{"vulnerability":"VCID-r7va-6j6s-rba5"},{"vulnerability":"VCID-w4c6-p858-rkaw"},{"vulnerability":"VCID-wxva-f9ay-c3a2"},{"vulnerability":"VCID-xmn1-g72k-8qcq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"}],"aliases":["CVE-2020-1472"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vnc5-neuk-m3ar"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/44829?format=json","vulnerability_id":"VCID-vu43-fq85-a7eq","summary":"Multiple vulnerabilities have been found in Samba, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10730.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10730.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-10730","reference_id":"","reference_type":"","scores":[{"value":"0.0314","scoring_system":"epss","scoring_elements":"0.86825","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0314","scoring_system":"epss","scoring_elements":"0.86929","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0314","scoring_system":"epss","scoring_elements":"0.8692","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0314","scoring_system":"epss","scoring_elements":"0.86926","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0314","scoring_system":"epss","scoring_elements":"0.86836","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0314","scoring_system":"epss","scoring_elements":"0.86855","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0314","scoring_system":"epss","scoring_elements":"0.86849","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0314","scoring_system":"epss","scoring_elements":"0.86868","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0314","scoring_system":"epss","scoring_elements":"0.86877","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0314","scoring_system":"epss","scoring_elements":"0.8689","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0314","scoring_system":"epss","scoring_elements":"0.86885","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0314","scoring_system":"epss","scoring_elements":"0.8688","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0314","scoring_system":"epss","scoring_elements":"0.86898","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0314","scoring_system":"epss","scoring_elements":"0.86903","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-10730"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10730","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10730"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27840","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27840"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20277","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20277"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1849489","reference_id":"1849489","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1849489"},{"reference_url":"https://security.archlinux.org/AVG-1202","reference_id":"AVG-1202","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1202"},{"reference_url":"https://security.gentoo.org/glsa/202007-15","reference_id":"GLSA-202007-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3118","reference_id":"RHSA-2020:3118","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3118"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3119","reference_id":"RHSA-2020:3119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3119"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4568","reference_id":"RHSA-2020:4568","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4568"},{"reference_url":"https://usn.ubuntu.com/4409-1/","reference_id":"USN-4409-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4409-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994567?format=json","purl":"pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-18xs-py1v-xfey"},{"vulnerability":"VCID-28rq-1d68-4bfz"},{"vulnerability":"VCID-2w26-yjmn-k7an"},{"vulnerability":"VCID-3du2-evy8-jfa1"},{"vulnerability":"VCID-5cd3-497h-qkhw"},{"vulnerability":"VCID-68zz-z589-87f6"},{"vulnerability":"VCID-6mju-nwzy-pqeq"},{"vulnerability":"VCID-745n-wca7-d7fh"},{"vulnerability":"VCID-7xdg-sn88-bkbs"},{"vulnerability":"VCID-84q8-2457-qkc5"},{"vulnerability":"VCID-94k8-98me-x3dw"},{"vulnerability":"VCID-apqw-e2px-yka5"},{"vulnerability":"VCID-b4ty-d775-5fed"},{"vulnerability":"VCID-bc1t-hzu5-bffd"},{"vulnerability":"VCID-bpht-9daq-rfgd"},{"vulnerability":"VCID-fskg-j9fe-6yeg"},{"vulnerability":"VCID-hfsk-4cbd-m3b1"},{"vulnerability":"VCID-kkwp-2x9m-9bgd"},{"vulnerability":"VCID-q2d9-vahb-6qce"},{"vulnerability":"VCID-r7va-6j6s-rba5"},{"vulnerability":"VCID-w4c6-p858-rkaw"},{"vulnerability":"VCID-wxva-f9ay-c3a2"},{"vulnerability":"VCID-xmn1-g72k-8qcq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"}],"aliases":["CVE-2020-10730"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vu43-fq85-a7eq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79829?format=json","vulnerability_id":"VCID-wfhc-ehpe-abaq","summary":"samba: Symlink race error can allow directory creation outside of the exported share","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43566.json","reference_id":"","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43566.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-43566","reference_id":"","reference_type":"","scores":[{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58129","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58215","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58235","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.5821","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58264","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58269","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58287","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58263","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58243","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58275","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58277","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58252","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58217","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.5823","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58216","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-43566"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43566"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004691","reference_id":"1004691","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004691"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2009676","reference_id":"2009676","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2009676"},{"reference_url":"https://usn.ubuntu.com/5260-1/","reference_id":"USN-5260-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5260-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994567?format=json","purl":"pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-18xs-py1v-xfey"},{"vulnerability":"VCID-28rq-1d68-4bfz"},{"vulnerability":"VCID-2w26-yjmn-k7an"},{"vulnerability":"VCID-3du2-evy8-jfa1"},{"vulnerability":"VCID-5cd3-497h-qkhw"},{"vulnerability":"VCID-68zz-z589-87f6"},{"vulnerability":"VCID-6mju-nwzy-pqeq"},{"vulnerability":"VCID-745n-wca7-d7fh"},{"vulnerability":"VCID-7xdg-sn88-bkbs"},{"vulnerability":"VCID-84q8-2457-qkc5"},{"vulnerability":"VCID-94k8-98me-x3dw"},{"vulnerability":"VCID-apqw-e2px-yka5"},{"vulnerability":"VCID-b4ty-d775-5fed"},{"vulnerability":"VCID-bc1t-hzu5-bffd"},{"vulnerability":"VCID-bpht-9daq-rfgd"},{"vulnerability":"VCID-fskg-j9fe-6yeg"},{"vulnerability":"VCID-hfsk-4cbd-m3b1"},{"vulnerability":"VCID-kkwp-2x9m-9bgd"},{"vulnerability":"VCID-q2d9-vahb-6qce"},{"vulnerability":"VCID-r7va-6j6s-rba5"},{"vulnerability":"VCID-w4c6-p858-rkaw"},{"vulnerability":"VCID-wxva-f9ay-c3a2"},{"vulnerability":"VCID-xmn1-g72k-8qcq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"}],"aliases":["CVE-2021-43566"],"risk_score":1.1,"exploitability":"0.5","weighted_severity":"2.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wfhc-ehpe-abaq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80058?format=json","vulnerability_id":"VCID-ws2g-8ye2-pkdk","summary":"samba: Null pointer dereference on missing sname in TGS-REQ","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3671.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3671.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3671","reference_id":"","reference_type":"","scores":[{"value":"0.03013","scoring_system":"epss","scoring_elements":"0.86538","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03013","scoring_system":"epss","scoring_elements":"0.86636","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03013","scoring_system":"epss","scoring_elements":"0.86628","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03013","scoring_system":"epss","scoring_elements":"0.86637","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03013","scoring_system":"epss","scoring_elements":"0.86548","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03013","scoring_system":"epss","scoring_elements":"0.86567","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03013","scoring_system":"epss","scoring_elements":"0.86568","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03013","scoring_system":"epss","scoring_elements":"0.86586","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03013","scoring_system":"epss","scoring_elements":"0.86596","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03013","scoring_system":"epss","scoring_elements":"0.8661","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03013","scoring_system":"epss","scoring_elements":"0.86607","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03013","scoring_system":"epss","scoring_elements":"0.86599","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03013","scoring_system":"epss","scoring_elements":"0.86613","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03013","scoring_system":"epss","scoring_elements":"0.86618","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2013080","reference_id":"2013080","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2013080"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=996586","reference_id":"996586","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=996586"},{"reference_url":"https://security.archlinux.org/AVG-2418","reference_id":"AVG-2418","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2418"},{"reference_url":"https://usn.ubuntu.com/5142-1/","reference_id":"USN-5142-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5142-1/"},{"reference_url":"https://usn.ubuntu.com/5174-1/","reference_id":"USN-5174-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5174-1/"},{"reference_url":"https://usn.ubuntu.com/5675-1/","reference_id":"USN-5675-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5675-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994567?format=json","purl":"pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-18xs-py1v-xfey"},{"vulnerability":"VCID-28rq-1d68-4bfz"},{"vulnerability":"VCID-2w26-yjmn-k7an"},{"vulnerability":"VCID-3du2-evy8-jfa1"},{"vulnerability":"VCID-5cd3-497h-qkhw"},{"vulnerability":"VCID-68zz-z589-87f6"},{"vulnerability":"VCID-6mju-nwzy-pqeq"},{"vulnerability":"VCID-745n-wca7-d7fh"},{"vulnerability":"VCID-7xdg-sn88-bkbs"},{"vulnerability":"VCID-84q8-2457-qkc5"},{"vulnerability":"VCID-94k8-98me-x3dw"},{"vulnerability":"VCID-apqw-e2px-yka5"},{"vulnerability":"VCID-b4ty-d775-5fed"},{"vulnerability":"VCID-bc1t-hzu5-bffd"},{"vulnerability":"VCID-bpht-9daq-rfgd"},{"vulnerability":"VCID-fskg-j9fe-6yeg"},{"vulnerability":"VCID-hfsk-4cbd-m3b1"},{"vulnerability":"VCID-kkwp-2x9m-9bgd"},{"vulnerability":"VCID-q2d9-vahb-6qce"},{"vulnerability":"VCID-r7va-6j6s-rba5"},{"vulnerability":"VCID-w4c6-p858-rkaw"},{"vulnerability":"VCID-wxva-f9ay-c3a2"},{"vulnerability":"VCID-xmn1-g72k-8qcq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"}],"aliases":["CVE-2021-3671"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ws2g-8ye2-pkdk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48496?format=json","vulnerability_id":"VCID-xwke-mduk-kyga","summary":"Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32744.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32744.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32744","reference_id":"","reference_type":"","scores":[{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62128","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64831","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.6482","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64792","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.6483","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64841","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64828","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64787","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.6475","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64799","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64814","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66718","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66717","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66704","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449","reference_id":"1016449","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016449"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2108205","reference_id":"2108205","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2108205"},{"reference_url":"https://security.archlinux.org/AVG-2782","reference_id":"AVG-2782","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2782"},{"reference_url":"https://security.gentoo.org/glsa/202309-06","reference_id":"GLSA-202309-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202309-06"},{"reference_url":"https://usn.ubuntu.com/5542-1/","reference_id":"USN-5542-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5542-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994567?format=json","purl":"pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-18xs-py1v-xfey"},{"vulnerability":"VCID-28rq-1d68-4bfz"},{"vulnerability":"VCID-2w26-yjmn-k7an"},{"vulnerability":"VCID-3du2-evy8-jfa1"},{"vulnerability":"VCID-5cd3-497h-qkhw"},{"vulnerability":"VCID-68zz-z589-87f6"},{"vulnerability":"VCID-6mju-nwzy-pqeq"},{"vulnerability":"VCID-745n-wca7-d7fh"},{"vulnerability":"VCID-7xdg-sn88-bkbs"},{"vulnerability":"VCID-84q8-2457-qkc5"},{"vulnerability":"VCID-94k8-98me-x3dw"},{"vulnerability":"VCID-apqw-e2px-yka5"},{"vulnerability":"VCID-b4ty-d775-5fed"},{"vulnerability":"VCID-bc1t-hzu5-bffd"},{"vulnerability":"VCID-bpht-9daq-rfgd"},{"vulnerability":"VCID-fskg-j9fe-6yeg"},{"vulnerability":"VCID-hfsk-4cbd-m3b1"},{"vulnerability":"VCID-kkwp-2x9m-9bgd"},{"vulnerability":"VCID-q2d9-vahb-6qce"},{"vulnerability":"VCID-r7va-6j6s-rba5"},{"vulnerability":"VCID-w4c6-p858-rkaw"},{"vulnerability":"VCID-wxva-f9ay-c3a2"},{"vulnerability":"VCID-xmn1-g72k-8qcq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"}],"aliases":["CVE-2022-32744"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xwke-mduk-kyga"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47968?format=json","vulnerability_id":"VCID-xyfs-p969-syfp","summary":"Multiple vulnerabilities have been found in Samba, the worst of\n    which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19344.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19344.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19344","reference_id":"","reference_type":"","scores":[{"value":"0.02193","scoring_system":"epss","scoring_elements":"0.8446","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02308","scoring_system":"epss","scoring_elements":"0.84683","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02308","scoring_system":"epss","scoring_elements":"0.84698","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02308","scoring_system":"epss","scoring_elements":"0.84719","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02308","scoring_system":"epss","scoring_elements":"0.8472","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02308","scoring_system":"epss","scoring_elements":"0.84742","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02308","scoring_system":"epss","scoring_elements":"0.84749","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02308","scoring_system":"epss","scoring_elements":"0.84767","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02308","scoring_system":"epss","scoring_elements":"0.84763","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02308","scoring_system":"epss","scoring_elements":"0.84757","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02308","scoring_system":"epss","scoring_elements":"0.84779","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02308","scoring_system":"epss","scoring_elements":"0.8478","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02308","scoring_system":"epss","scoring_elements":"0.84778","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02308","scoring_system":"epss","scoring_elements":"0.84805","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02308","scoring_system":"epss","scoring_elements":"0.84815","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19344"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19344","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19344"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1791204","reference_id":"1791204","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1791204"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=950499","reference_id":"950499","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=950499"},{"reference_url":"https://security.gentoo.org/glsa/202003-52","reference_id":"GLSA-202003-52","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-52"},{"reference_url":"https://usn.ubuntu.com/4244-1/","reference_id":"USN-4244-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4244-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994567?format=json","purl":"pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-18xs-py1v-xfey"},{"vulnerability":"VCID-28rq-1d68-4bfz"},{"vulnerability":"VCID-2w26-yjmn-k7an"},{"vulnerability":"VCID-3du2-evy8-jfa1"},{"vulnerability":"VCID-5cd3-497h-qkhw"},{"vulnerability":"VCID-68zz-z589-87f6"},{"vulnerability":"VCID-6mju-nwzy-pqeq"},{"vulnerability":"VCID-745n-wca7-d7fh"},{"vulnerability":"VCID-7xdg-sn88-bkbs"},{"vulnerability":"VCID-84q8-2457-qkc5"},{"vulnerability":"VCID-94k8-98me-x3dw"},{"vulnerability":"VCID-apqw-e2px-yka5"},{"vulnerability":"VCID-b4ty-d775-5fed"},{"vulnerability":"VCID-bc1t-hzu5-bffd"},{"vulnerability":"VCID-bpht-9daq-rfgd"},{"vulnerability":"VCID-fskg-j9fe-6yeg"},{"vulnerability":"VCID-hfsk-4cbd-m3b1"},{"vulnerability":"VCID-kkwp-2x9m-9bgd"},{"vulnerability":"VCID-q2d9-vahb-6qce"},{"vulnerability":"VCID-r7va-6j6s-rba5"},{"vulnerability":"VCID-w4c6-p858-rkaw"},{"vulnerability":"VCID-wxva-f9ay-c3a2"},{"vulnerability":"VCID-xmn1-g72k-8qcq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"}],"aliases":["CVE-2019-19344"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xyfs-p969-syfp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47962?format=json","vulnerability_id":"VCID-ycau-9h17-quf3","summary":"Multiple vulnerabilities have been found in Samba, the worst of\n    which could lead to remote code execution.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00045.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00045.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10197.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10197.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10197","reference_id":"","reference_type":"","scores":[{"value":"0.0479","scoring_system":"epss","scoring_elements":"0.89441","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0479","scoring_system":"epss","scoring_elements":"0.8951","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0479","scoring_system":"epss","scoring_elements":"0.89493","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0479","scoring_system":"epss","scoring_elements":"0.89491","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0479","scoring_system":"epss","scoring_elements":"0.89505","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0479","scoring_system":"epss","scoring_elements":"0.89509","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0479","scoring_system":"epss","scoring_elements":"0.89445","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0479","scoring_system":"epss","scoring_elements":"0.89455","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0479","scoring_system":"epss","scoring_elements":"0.89457","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0479","scoring_system":"epss","scoring_elements":"0.89473","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0479","scoring_system":"epss","scoring_elements":"0.89477","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0479","scoring_system":"epss","scoring_elements":"0.89486","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0479","scoring_system":"epss","scoring_elements":"0.89484","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0479","scoring_system":"epss","scoring_elements":"0.89479","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10197"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10197","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10197"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10197","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10197"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/56ZUXHGDHPM7S6RVAKULZT5EATS37OKA/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/56ZUXHGDHPM7S6RVAKULZT5EATS37OKA/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7NYIUZOCIDXWXGWMZ7O5Z7OJ6IX7EAB/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7NYIUZOCIDXWXGWMZ7O5Z7OJ6IX7EAB/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z6EEKFT24DQI4DMZMSQTLMNZWG4RMZ57/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z6EEKFT24DQI4DMZMSQTLMNZWG4RMZ57/"},{"reference_url":"https://seclists.org/bugtraq/2019/Sep/4","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Sep/4"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190903-0001/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20190903-0001/"},{"reference_url":"https://support.f5.com/csp/article/K69511801","reference_id":"","reference_type":"","scores":[],"url":"https://support.f5.com/csp/article/K69511801"},{"reference_url":"https://support.f5.com/csp/article/K69511801?utm_source=f5support&amp%3Butm_medium=RSS","reference_id":"","reference_type":"","scores":[],"url":"https://support.f5.com/csp/article/K69511801?utm_source=f5support&amp%3Butm_medium=RSS"},{"reference_url":"https://www.debian.org/security/2019/dsa-4513","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2019/dsa-4513"},{"reference_url":"https://www.samba.org/samba/security/CVE-2019-10197.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.samba.org/samba/security/CVE-2019-10197.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1746225","reference_id":"1746225","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1746225"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.10.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:samba:samba:4.10.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.10.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.10.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:samba:samba:4.10.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.10.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.10.0:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:samba:samba:4.10.0:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.10.0:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.10.0:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:samba:samba:4.10.0:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.10.0:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.11.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:samba:samba:4.11.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.11.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.11.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:samba:samba:4.11.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.11.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.11.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:samba:samba:4.11.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.11.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.11.0:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:samba:samba:4.11.0:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.11.0:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.9.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:samba:samba:4.9.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.9.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.9.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:samba:samba:4.9.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.9.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.9.0:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:samba:samba:4.9.0:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.9.0:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.9.0:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:samba:samba:4.9.0:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.9.0:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.9.0:rc5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:samba:samba:4.9.0:rc5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:4.9.0:rc5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10197","reference_id":"CVE-2019-10197","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:N"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"9.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10197"},{"reference_url":"https://security.gentoo.org/glsa/202003-52","reference_id":"GLSA-202003-52","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-52"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3253","reference_id":"RHSA-2019:3253","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3253"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4023","reference_id":"RHSA-2019:4023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1084","reference_id":"RHSA-2020:1084","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1084"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1878","reference_id":"RHSA-2020:1878","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1878"},{"reference_url":"https://usn.ubuntu.com/4121-1/","reference_id":"USN-4121-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4121-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1038160?format=json","purl":"pkg:deb/debian/samba@2:4.9.5%2Bdfsg-5%2Bdeb10u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2dm7-xt4e-wkex"},{"vulnerability":"VCID-2gkd-vubu-j7fd"},{"vulnerability":"VCID-47k4-8k1s-zff2"},{"vulnerability":"VCID-4qm6-a9un-nyda"},{"vulnerability":"VCID-55zj-6b4s-8ker"},{"vulnerability":"VCID-5vyg-1jzr-ebh8"},{"vulnerability":"VCID-745n-wca7-d7fh"},{"vulnerability":"VCID-76sz-d2yt-buek"},{"vulnerability":"VCID-7bb1-3ny6-rbbv"},{"vulnerability":"VCID-88mw-c7mc-jugp"},{"vulnerability":"VCID-9cyh-d77a-vyhj"},{"vulnerability":"VCID-9t1m-6chr-e3dt"},{"vulnerability":"VCID-cgez-urtv-qbhq"},{"vulnerability":"VCID-crh2-zv3e-pfaa"},{"vulnerability":"VCID-ez9s-vn2t-w7a6"},{"vulnerability":"VCID-ezk6-jy86-y3h4"},{"vulnerability":"VCID-f772-3dtd-wba8"},{"vulnerability":"VCID-f9hv-k2xk-puhq"},{"vulnerability":"VCID-fh3j-efv1-tybp"},{"vulnerability":"VCID-frnd-3wwy-93ek"},{"vulnerability":"VCID-gs98-hcdd-2yf9"},{"vulnerability":"VCID-hnhm-ud2a-nugz"},{"vulnerability":"VCID-hzy4-16j5-8qcf"},{"vulnerability":"VCID-m44e-rw2w-vuhj"},{"vulnerability":"VCID-mgaq-qjdw-fke4"},{"vulnerability":"VCID-mw6j-fkm4-pkg2"},{"vulnerability":"VCID-p1se-92ae-t3b5"},{"vulnerability":"VCID-qt4e-73xg-bqde"},{"vulnerability":"VCID-rgu3-rgej-aucp"},{"vulnerability":"VCID-rnfg-1cgy-jbaq"},{"vulnerability":"VCID-rphh-hzna-nbgf"},{"vulnerability":"VCID-s2ne-rcp3-nbgz"},{"vulnerability":"VCID-s6ma-9h2y-hyc4"},{"vulnerability":"VCID-smxs-4de1-nfec"},{"vulnerability":"VCID-t3zy-v34p-7uen"},{"vulnerability":"VCID-tk1x-bex4-8kbz"},{"vulnerability":"VCID-vg7n-k8px-ayd5"},{"vulnerability":"VCID-vnc5-neuk-m3ar"},{"vulnerability":"VCID-vu43-fq85-a7eq"},{"vulnerability":"VCID-wfhc-ehpe-abaq"},{"vulnerability":"VCID-ws2g-8ye2-pkdk"},{"vulnerability":"VCID-xwke-mduk-kyga"},{"vulnerability":"VCID-xyfs-p969-syfp"},{"vulnerability":"VCID-ycau-9h17-quf3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.9.5%252Bdfsg-5%252Bdeb10u3"},{"url":"http://public2.vulnerablecode.io/api/packages/994567?format=json","purl":"pkg:deb/debian/samba@2:4.13.13%2Bdfsg-1~deb11u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-18xs-py1v-xfey"},{"vulnerability":"VCID-28rq-1d68-4bfz"},{"vulnerability":"VCID-2w26-yjmn-k7an"},{"vulnerability":"VCID-3du2-evy8-jfa1"},{"vulnerability":"VCID-5cd3-497h-qkhw"},{"vulnerability":"VCID-68zz-z589-87f6"},{"vulnerability":"VCID-6mju-nwzy-pqeq"},{"vulnerability":"VCID-745n-wca7-d7fh"},{"vulnerability":"VCID-7xdg-sn88-bkbs"},{"vulnerability":"VCID-84q8-2457-qkc5"},{"vulnerability":"VCID-94k8-98me-x3dw"},{"vulnerability":"VCID-apqw-e2px-yka5"},{"vulnerability":"VCID-b4ty-d775-5fed"},{"vulnerability":"VCID-bc1t-hzu5-bffd"},{"vulnerability":"VCID-bpht-9daq-rfgd"},{"vulnerability":"VCID-fskg-j9fe-6yeg"},{"vulnerability":"VCID-hfsk-4cbd-m3b1"},{"vulnerability":"VCID-kkwp-2x9m-9bgd"},{"vulnerability":"VCID-q2d9-vahb-6qce"},{"vulnerability":"VCID-r7va-6j6s-rba5"},{"vulnerability":"VCID-w4c6-p858-rkaw"},{"vulnerability":"VCID-wxva-f9ay-c3a2"},{"vulnerability":"VCID-xmn1-g72k-8qcq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"}],"aliases":["CVE-2019-10197"],"risk_score":4.1,"exploitability":"0.5","weighted_severity":"8.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ycau-9h17-quf3"}],"risk_score":"4.5","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/samba@2:4.13.13%252Bdfsg-1~deb11u6"}