Max CVSS | 10.0 | Min CVSS | 3.3 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2018-1050 | 3.3 |
All versions of Samba from 4.0.0 onwards are vulnerable to a denial of service attack when the RPC spoolss service is configured to be run as an external daemon. Missing input sanitization checks on some of the input parameters to spoolss RPC calls c
|
01-09-2022 - 16:35 | 13-03-2018 - 16:29 | |
CVE-2017-15275 | 5.0 |
Samba before 4.7.3 might allow remote attackers to obtain sensitive information by leveraging failure of the server to clear allocated heap memory.
|
29-08-2022 - 20:43 | 27-11-2017 - 22:29 | |
CVE-2016-2119 | 6.8 |
libcli/smb/smbXcli_base.c in Samba 4.x before 4.2.14, 4.3.x before 4.3.11, and 4.4.x before 4.4.5 allows man-in-the-middle attackers to bypass a client-signing protection mechanism, and consequently spoof SMB2 and SMB3 servers, via the (1) SMB2_SESSI
|
29-08-2022 - 20:20 | 07-07-2016 - 15:59 | |
CVE-2018-1057 | 6.5 |
On a Samba 4 AD DC the LDAP server in all versions of Samba from 4.0.0 onwards incorrectly validates permissions to modify passwords over LDAP allowing authenticated users to change any other users' passwords, including administrative users and privi
|
29-08-2022 - 20:11 | 13-03-2018 - 16:29 | |
CVE-2017-7494 | 10.0 |
Samba since version 3.5.0 and before 4.6.4, 4.5.10 and 4.4.14 is vulnerable to remote code execution vulnerability, allowing a malicious client to upload a shared library to a writable share, and then cause the server to load and execute it.
|
16-08-2022 - 13:02 | 30-05-2017 - 18:29 | |
CVE-2017-14746 | 7.5 |
Use-after-free vulnerability in Samba 4.x before 4.7.3 allows remote attackers to execute arbitrary code via a crafted SMB1 request.
|
16-08-2022 - 13:01 | 27-11-2017 - 22:29 |