Lookup for vulnerable packages by Package URL.
| Purl | pkg:deb/debian/accountsservice@0?distro=trixie |
| Type | deb |
| Namespace | debian |
| Name | accountsservice |
| Version | 0 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | false |
| Next_non_vulnerable_version | 0.6.15-3 |
| Latest_non_vulnerable_version | 23.13.9-8 |
| Affected_by_vulnerabilities |
|
| Fixing_vulnerabilities |
| 0 |
| url |
VCID-4wd1-kxpx-9ugm |
| vulnerability_id |
VCID-4wd1-kxpx-9ugm |
| summary |
An Ubuntu-specific modification to AccountsService in versions before 0.6.55-0ubuntu13.2, among other earlier versions, would perform unbounded read operations on user-controlled ~/.pam_environment files, allowing an infinite loop if /dev/zero is symlinked to this location. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-16127 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00172 |
| scoring_system |
epss |
| scoring_elements |
0.38474 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00172 |
| scoring_system |
epss |
| scoring_elements |
0.3861 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00172 |
| scoring_system |
epss |
| scoring_elements |
0.38634 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00172 |
| scoring_system |
epss |
| scoring_elements |
0.38496 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00172 |
| scoring_system |
epss |
| scoring_elements |
0.38548 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00172 |
| scoring_system |
epss |
| scoring_elements |
0.38556 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00172 |
| scoring_system |
epss |
| scoring_elements |
0.38567 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00172 |
| scoring_system |
epss |
| scoring_elements |
0.38529 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00172 |
| scoring_system |
epss |
| scoring_elements |
0.38503 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00172 |
| scoring_system |
epss |
| scoring_elements |
0.38551 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00172 |
| scoring_system |
epss |
| scoring_elements |
0.38449 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-16127 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-16127
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4wd1-kxpx-9ugm |
|
| 1 |
| url |
VCID-bqzt-u1sk-3fht |
| vulnerability_id |
VCID-bqzt-u1sk-3fht |
| summary |
accountsservice no longer drops permissions when writting .pam_environment |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1804 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05491 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05389 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.0538 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05331 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05332 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05283 |
| published_at |
2026-04-01T12:55:00Z |
|
| 6 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05326 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05357 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05375 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05409 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05432 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05401 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1804 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1804
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bqzt-u1sk-3fht |
|
| 2 |
| url |
VCID-bxkw-9x1u-sbhm |
| vulnerability_id |
VCID-bxkw-9x1u-sbhm |
| summary |
accountsservice: use-after-free via a D-Bus message to the accounts-daemon process |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-3297 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13209 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13088 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13275 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13075 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13156 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13208 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13177 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13139 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13087 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.12988 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.12991 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-3297 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-3297
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bxkw-9x1u-sbhm |
|
| 3 |
| url |
VCID-chd6-4yfy-x7hg |
| vulnerability_id |
VCID-chd6-4yfy-x7hg |
| summary |
An Ubuntu-specific modification to AccountsService in versions before 0.6.55-0ubuntu13.2, among other earlier versions, improperly dropped the ruid, allowing untrusted users to send signals to AccountService, thus stopping it from handling D-Bus messages in a timely fashion. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-16126 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01989 |
| scoring_system |
epss |
| scoring_elements |
0.83541 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01989 |
| scoring_system |
epss |
| scoring_elements |
0.83553 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01989 |
| scoring_system |
epss |
| scoring_elements |
0.83568 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01989 |
| scoring_system |
epss |
| scoring_elements |
0.83569 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01989 |
| scoring_system |
epss |
| scoring_elements |
0.83593 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01989 |
| scoring_system |
epss |
| scoring_elements |
0.83602 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01989 |
| scoring_system |
epss |
| scoring_elements |
0.83617 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01989 |
| scoring_system |
epss |
| scoring_elements |
0.83611 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01989 |
| scoring_system |
epss |
| scoring_elements |
0.83606 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01989 |
| scoring_system |
epss |
| scoring_elements |
0.83641 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01989 |
| scoring_system |
epss |
| scoring_elements |
0.83642 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-16126 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-16126
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-chd6-4yfy-x7hg |
|
| 4 |
| url |
VCID-pnj9-7czc-pqfc |
| vulnerability_id |
VCID-pnj9-7czc-pqfc |
| summary |
Ubuntu-specific modifications to accountsservice (in patch file debian/patches/0010-set-language.patch) caused the fallback_locale variable, pointing to static storage, to be freed, in the user_change_language_authorized_cb function. This is reachable via the SetLanguage dbus function. This is fixed in versions 0.6.55-0ubuntu12~20.04.5, 0.6.55-0ubuntu13.3, 0.6.55-0ubuntu14.1. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3939 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00124 |
| scoring_system |
epss |
| scoring_elements |
0.31592 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00124 |
| scoring_system |
epss |
| scoring_elements |
0.31724 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00124 |
| scoring_system |
epss |
| scoring_elements |
0.31769 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00124 |
| scoring_system |
epss |
| scoring_elements |
0.31587 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00124 |
| scoring_system |
epss |
| scoring_elements |
0.3164 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00124 |
| scoring_system |
epss |
| scoring_elements |
0.31669 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00124 |
| scoring_system |
epss |
| scoring_elements |
0.31673 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00124 |
| scoring_system |
epss |
| scoring_elements |
0.31631 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00124 |
| scoring_system |
epss |
| scoring_elements |
0.31595 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00124 |
| scoring_system |
epss |
| scoring_elements |
0.3163 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00124 |
| scoring_system |
epss |
| scoring_elements |
0.31608 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00124 |
| scoring_system |
epss |
| scoring_elements |
0.31576 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3939 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3939
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pnj9-7czc-pqfc |
|
|
| Risk_score | null |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:deb/debian/accountsservice@0%3Fdistro=trixie |